3 KEY ESTABLISHMENT
PROTOCOLS THAT USE
DIGITAL SIGNATURES
Digital signature schemes (and other public key en-
cryption schemes) are often employed as secure
building blocks in key establishment protocols that
use public key authentication for the purpose of en-
suring the parties involved in the communication that
the session key was established with the intended peer
and not with an impostor. Once a session key is avail-
able, the data exchanged is authenticated and undis-
closed against third parties thus allowing secure com-
munications over an insecure network.
Traditionally, cryptographic protocol security has
been a matter of perceived confidence supported by
heuristic proof arguments and by the protocol surviv-
ing many years of public scrutiny. More recently, the
approach has changed and the priority has switched
to developing formal proof frameworks. In this con-
text, a main line of research employs complexity-
theoretic models for distributed network computing
and is dedicated to key establishment protocols (Bel-
lare and Rogaway, 1993; Blake-Wilson and Menezes,
1998; Shoup, 1999; Bellare et al., 2000; Canetti and
Krawczyk, 2001; LaMacchia et al., 2006; Diffie et al.,
1992). Such models employ both private and public
key cryptographic techniques.
In the above models most of the fine level details
of PKIs are abstracted away; while in principle this
is a reasonable approach (we already mentioned that
PKIs are an intricate subject on their own) we often
see that important topics such as the key registration
procedures and policies employed by CAs are disre-
garded by many authors. We believe that such issues
are not only tightly related to the correct operation
of the protocol but may also eventually lead to (legal)
disputes among the participants and therefore must be
appropriately settled.
As a starting point for our discussion, let us recall
three public key registration procedures commonly
encountered in the literature (LaMacchia et al., 2006):
a. Honest key registration. All parties (including
those controlled by the adversary) follow the key
generation procedures honestly and register the
resulting public keys before engaging in any com-
munications. The adversary can corrupt parties
only after key registration has completed;
b. Proof-of-possession. An authority performs some
validity check upon public key registration. In
particular, a party is required to prove knowledge
of the corresponding secret key. The adversary
can register public keys for corrupted parties at
any time;
c. Arbitrary key registration. Parties can register ar-
bitrary public keys (even the same key as some
other party) without any validity checks. The ad-
versary can register public key for corrupted par-
ties at any time.
We comment that case c. is unrealistic since it is ex-
tremely unlikely that a CA will ever accept to enroll
public keys for which the requester has not provided
any validity check; the minimum requirement is veri-
fying the identity of the applicant.
Item a. exemplifies the behavior one would nor-
mally expect from honest principals holding valid cer-
tificates. The case of interest here is the compromise
of the private key of a principal whether or not he is
aware of this fact (the adversary may be able to subtly
obtain a copy of the private key).
The proof-of-possession requirement invoked by
item b. is not sufficient to achieve adequate levels
of security (as discussed above); we have already
pointed out that without a proof-of-identity CAs will
not issue certificates. We nowelaborate further on this
point.
Lauter and Mityagin (Lauter and Mityagin, 2006)
have recently presented protocol KEA+ that, as op-
posed to the original version (KEA), is resilient to un-
known key share (UKS) attacks; as a countermeasure,
they suggest to include the identities of the protocol
participants as arguments of the key derivation func-
tion (KDF) and also claim that the above countermea-
sure avoids the need for a proof-of-possession.
Recall that a UKS attack involves a (man-in-the-
middle) adversary, posing as a legitimate party (say
C) in a protocol run between honest parties (say A
and B), that is able to convince one party (e.g. A) to
accept her identity (C) while the peer (B) is unaware
of this fact (i.e. B thinks he’s interacting with A). This
vulnerability is regarded of interest whether or not the
adversary is able to have the attacked party accept a
chosen session key.
We believe there are two issues that are over-
looked in their arguments. Firstly, the adversary must
provide a valid proof-of-identity;therefore, unless she
is willing to reveal her true identity (otherwise she
must be able to perfectly disguise herself and also of-
fer a counterfeit id card — indeed a non trivial task),
she may be liable of being legally pursued for her ac-
tions in a court of law. Observe also that the (physical)
proof-of-identity policy rules out the well known on-
line UKS attack described by Kaliski (Kaliski, 2001)
against the MQV protocol (Law et al., 2003) (notice
that in this attack the adversary is able to have the tar-
get party accept a chosen session key).
Secondly, the lack of a proof-of-possession (albeit
ICE-B 2008 - International Conference on e-Business
336