Abstract
The confidentiality of encrypted data depends on how well the key under which it was encrypted is maintained. If a session key was exchanged encrypted under a long-term key, exposure of the long-term key may reveal the session key and hence the data encrypted with it. The problem of key-dependencies between keys can be mapped onto connectivity of a graph, and the resulting graph can be inspected. This article presents a structured method (an algorithm) with which key-dependencies can be detected and analysed. Several well-known protocols are examined, and it is shown that they are vulnerable to certain attacks exploiting key-dependencies. Protocols which are free from this defect do exist. That is, when a session is terminated it is properly closed.
Original language | Undefined |
---|---|
Pages | 356-366 |
Number of pages | 11 |
DOIs | |
Publication status | Published - Jul 1998 |
Event | 3rd Australasian Conference on Information Security and Privacy, ACISP 1998 - Brisbane, Australia Duration: 13 Jul 1998 → 15 Jul 1998 Conference number: 3 |
Conference
Conference | 3rd Australasian Conference on Information Security and Privacy, ACISP 1998 |
---|---|
Abbreviated title | ACISP |
Country/Territory | Australia |
City | Brisbane |
Period | 13/07/98 → 15/07/98 |
Keywords
- IR-56226
- EWI-1061