Deep Random based Key Exchange protocol resisting unlimited MITM

We present a protocol enabling two legitimate partners sharing an initial secret to mutually authenticate and to exchange an encryption session key. The opponent is an active Man In The Middle (MITM) with unlimited computation and storage capacities. The resistance to unlimited MITM is obtained thro...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: de Valroger, Thibault
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator de Valroger, Thibault
description We present a protocol enabling two legitimate partners sharing an initial secret to mutually authenticate and to exchange an encryption session key. The opponent is an active Man In The Middle (MITM) with unlimited computation and storage capacities. The resistance to unlimited MITM is obtained through the combined use of Deep Random secrecy, formerly introduced and proved as unconditionally secure against passive opponent for key exchange, and universal hashing techniques. We prove the resistance to MITM interception attacks, and show that (i) upon successful completion, the protocol leaks no residual information about the current value of the shared secret to the opponent, and (ii) that any unsuccessful completion is detectable by the legitimate partners. We also discuss implementation techniques.
doi_str_mv 10.48550/arxiv.1801.01456
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_1801_01456</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1801_01456</sourcerecordid><originalsourceid>FETCH-LOGICAL-a676-6716fec70e7018797dec1a01bf74f2bf409041558f4a07e21b07611b6843d8173</originalsourceid><addsrcrecordid>eNotz8tOwzAQhWFvWKDCA7DCL5Aw09gedwcqBSpaIaHsIzsZF0u5yQmofXugsDqbX0f6hLhByJXVGu5cOsavHC1gDqi0uRT3j8yjfHd9M3TSu4kb-conuTnWH64_sBzTMA_10MrEU5zm2B_kZ9_GLs4_5X5b7q_ERXDtxNf_uxDl06Zcv2S7t-ft-mGXOUMmM4QmcE3ABGhpRQ3X6AB9IBWWPihYgUKtbVAOiJfogQyiN1YVjUUqFuL27_ZMqMYUO5dO1S-lOlOKb4KfQkI</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Deep Random based Key Exchange protocol resisting unlimited MITM</title><source>arXiv.org</source><creator>de Valroger, Thibault</creator><creatorcontrib>de Valroger, Thibault</creatorcontrib><description>We present a protocol enabling two legitimate partners sharing an initial secret to mutually authenticate and to exchange an encryption session key. The opponent is an active Man In The Middle (MITM) with unlimited computation and storage capacities. The resistance to unlimited MITM is obtained through the combined use of Deep Random secrecy, formerly introduced and proved as unconditionally secure against passive opponent for key exchange, and universal hashing techniques. We prove the resistance to MITM interception attacks, and show that (i) upon successful completion, the protocol leaks no residual information about the current value of the shared secret to the opponent, and (ii) that any unsuccessful completion is detectable by the legitimate partners. We also discuss implementation techniques.</description><identifier>DOI: 10.48550/arxiv.1801.01456</identifier><language>eng</language><subject>Computer Science - Cryptography and Security</subject><creationdate>2018-01</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,777,882</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/1801.01456$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.1801.01456$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>de Valroger, Thibault</creatorcontrib><title>Deep Random based Key Exchange protocol resisting unlimited MITM</title><description>We present a protocol enabling two legitimate partners sharing an initial secret to mutually authenticate and to exchange an encryption session key. The opponent is an active Man In The Middle (MITM) with unlimited computation and storage capacities. The resistance to unlimited MITM is obtained through the combined use of Deep Random secrecy, formerly introduced and proved as unconditionally secure against passive opponent for key exchange, and universal hashing techniques. We prove the resistance to MITM interception attacks, and show that (i) upon successful completion, the protocol leaks no residual information about the current value of the shared secret to the opponent, and (ii) that any unsuccessful completion is detectable by the legitimate partners. We also discuss implementation techniques.</description><subject>Computer Science - Cryptography and Security</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotz8tOwzAQhWFvWKDCA7DCL5Aw09gedwcqBSpaIaHsIzsZF0u5yQmofXugsDqbX0f6hLhByJXVGu5cOsavHC1gDqi0uRT3j8yjfHd9M3TSu4kb-conuTnWH64_sBzTMA_10MrEU5zm2B_kZ9_GLs4_5X5b7q_ERXDtxNf_uxDl06Zcv2S7t-ft-mGXOUMmM4QmcE3ABGhpRQ3X6AB9IBWWPihYgUKtbVAOiJfogQyiN1YVjUUqFuL27_ZMqMYUO5dO1S-lOlOKb4KfQkI</recordid><startdate>20180103</startdate><enddate>20180103</enddate><creator>de Valroger, Thibault</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20180103</creationdate><title>Deep Random based Key Exchange protocol resisting unlimited MITM</title><author>de Valroger, Thibault</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a676-6716fec70e7018797dec1a01bf74f2bf409041558f4a07e21b07611b6843d8173</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Computer Science - Cryptography and Security</topic><toplevel>online_resources</toplevel><creatorcontrib>de Valroger, Thibault</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>de Valroger, Thibault</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Deep Random based Key Exchange protocol resisting unlimited MITM</atitle><date>2018-01-03</date><risdate>2018</risdate><abstract>We present a protocol enabling two legitimate partners sharing an initial secret to mutually authenticate and to exchange an encryption session key. The opponent is an active Man In The Middle (MITM) with unlimited computation and storage capacities. The resistance to unlimited MITM is obtained through the combined use of Deep Random secrecy, formerly introduced and proved as unconditionally secure against passive opponent for key exchange, and universal hashing techniques. We prove the resistance to MITM interception attacks, and show that (i) upon successful completion, the protocol leaks no residual information about the current value of the shared secret to the opponent, and (ii) that any unsuccessful completion is detectable by the legitimate partners. We also discuss implementation techniques.</abstract><doi>10.48550/arxiv.1801.01456</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.1801.01456
ispartof
issn
language eng
recordid cdi_arxiv_primary_1801_01456
source arXiv.org
subjects Computer Science - Cryptography and Security
title Deep Random based Key Exchange protocol resisting unlimited MITM
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T22%3A23%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Deep%20Random%20based%20Key%20Exchange%20protocol%20resisting%20unlimited%20MITM&rft.au=de%20Valroger,%20Thibault&rft.date=2018-01-03&rft_id=info:doi/10.48550/arxiv.1801.01456&rft_dat=%3Carxiv_GOX%3E1801_01456%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true