Pregled bibliografske jedinice broj: 1100862
Actor Key Compromise: Consequences and Countermeasures
Actor Key Compromise: Consequences and Countermeasures // 2014 IEEE 27th Computer Security Foundations Symposium
Beč, Austrija: Institute of Electrical and Electronics Engineers (IEEE), 2014. str. 244-258 doi:10.1109/csf.2014.25 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni)
CROSBI ID: 1100862 Za ispravke kontaktirajte CROSBI podršku putem web obrasca
Naslov
Actor Key Compromise: Consequences and Countermeasures
Autori
Basin, David ; Cremers, Cas ; Horvat, Marko
Vrsta, podvrsta i kategorija rada
Radovi u zbornicima skupova, cjeloviti rad (in extenso), znanstveni
Skup
2014 IEEE 27th Computer Security Foundations Symposium
Mjesto i datum
Beč, Austrija, 19.07.2014. - 22.07.2014
Vrsta sudjelovanja
Predavanje
Vrsta recenzije
Međunarodna recenzija
Ključne riječi
Security protocols ; security properties ; Key Compromise Impersonation ; adversary models ; TLS ; SSH
Sažetak
Despite Alice’s best efforts, her long-term secret keys may be revealed to an adversary. Possible reasons include weakly generated keys, compromised key storage, subpoena, and coercion. However, Alice may still be able to communicate securely with other parties, depending on the protocol used. We call the associated property resilience against Actor Key Compromise (AKC). We formalise this property in a symbolic model and identify conditions under which it can and cannot be achieved. In case studies that include TLS and SSH, we find that many protocols are not resilient against AKC. We implement a concrete AKC attack on the mutually authenticated TLS protocol.
Izvorni jezik
Engleski
Znanstvena područja
Matematika, Računarstvo
POVEZANOST RADA
Ustanove:
Prirodoslovno-matematički fakultet, Matematički odjel, Zagreb,
Prirodoslovno-matematički fakultet, Zagreb
Profili:
Marko Horvat
(autor)