Detecting key-dependencies

Tage Stabell-Kulo, Arne Helme, Gianluca Dini

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    183 Downloads (Pure)

    Abstract

    The confidentiality of encrypted data depends on how well the key under which it was encrypted is maintained. If a session key was exchanged encrypted under a long-term key, exposure of the long-term key may reveal the session key and hence the data encrypted with it. The problem of key-dependencies between keys can be mapped onto connectivity of a graph, and the resulting graph can be inspected. This article presents a structured method (an algorithm) with which key-dependencies can be detected and analysed. Several well-known protocols are examined, and it is shown that they are vulnerable to certain attacks exploiting key-dependencies. Protocols which are free from this defect do exist. That is, when a session is terminated it is properly closed.
    Original languageEnglish
    Title of host publicationInformation Security and Privacy
    Subtitle of host publicationThird Australasian Conference, ACISP'98, Brisbane, Australia July 13-15, 1998, Proceedings
    EditorsColin Boyd, Ed Dawson
    Place of PublicationBerlin, Heidelberg
    PublisherSpringer
    Pages356-366
    Number of pages11
    ISBN (Electronic)978-3-540-69101-3
    ISBN (Print)978-3-540-64732-4
    DOIs
    Publication statusPublished - Jul 1998
    Event3rd Australasian Conference on Information Security and Privacy, ACISP 1998 - Brisbane, Australia
    Duration: 13 Jul 199815 Jul 1998
    Conference number: 3

    Publication series

    NameLecture Notes in Computer Science
    PublisherSpringer
    Volume 1438
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Conference

    Conference3rd Australasian Conference on Information Security and Privacy, ACISP 1998
    Abbreviated titleACISP
    Country/TerritoryAustralia
    CityBrisbane
    Period13/07/9815/07/98

    Fingerprint

    Dive into the research topics of 'Detecting key-dependencies'. Together they form a unique fingerprint.

    Cite this