Thèse de doctorat (Mémoires et thèses)
Attaques et preuves de sécurité des protocoles d'échange de clés authentifiés
SALA, Petra
2021
 

Documents


Texte intégral
Phd_thesis_Petra_SALA_orbilu.pdf
Postprint Auteur (1.16 MB)
Télécharger

Tous les documents dans ORBilu sont protégés par une licence d'utilisation.

Envoyer vers



Détails



Mots-clés :
Attacks; Security Proofs; Password Authenticated Key-Exchange
Résumé :
[en] The vast majority of communication on the Internet and private networks heavily relies on Public-key infrastructure (PKI). One possible solution, to avoid complexities around PKI, is to use Password Authenticated Key-Exchange (PAKE) protocols. PAKE protocols enable a secure communication link between the two parties who only share a low-entropy secret (password). PAKEs were introduced in the 1990s, and with the introduction of the first security models and security proofs in the early 2000s, it was clear that PAKEs have a potential for wide deployment - filling the gap where PKI falls short. PAKEs' PKI-free nature, resistance to phishing attacks and forward secrecy are just some of the properties that make them interesting and important to study. This dissertation includes three works on various aspects of PAKEs: an attack on an existing PAKE proposal, an application of PAKEs in login (for password leak detection) and authentication protocols (HoneyPAKEs), and a security analysis of the J-PAKE protocol, that is used in practice, and its variants. In our first work, we provide an empirical analysis of the zkPAKE protocol proposed in 2015. Our findings show that zkPAKE is not safe against offline dictionary attacks, which is one of the basic security requirements of the PAKE protocols. Further, we demonstrate an implementation of an efficient offline dictionary attack, which emphasizes that, it is necessary to provide a rigorous security proof when proposing a new protocol. In our second contribution, we propose a combined security mechanism called HoneyPAKE. The HoneyPAKE construction aims to detect the loss of password files and ensures that PAKE intrinsically protects that password. This makes the PAKE part of the HoneyPAKE more resilient to server-compromise and pre-computation attacks which are a serious security threat in a client-server communication. Our third contribution facilitates the wider adoption of PAKEs. In this work, we revisit J-PAKE and simplify it by removing a non-interactive zero knowledge proof from the last round of the protocol and derive a lighter and more efficient version called sJ-PAKE. Furthermore, we prove sJ-PAKE secure in the indistinguishability game-based model, the so-called Real-or-Random, also satisfying the notion of perfect forward secrecy.
Disciplines :
Sciences informatiques
Auteur, co-auteur :
SALA, Petra ;  University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)
Langue du document :
Anglais
Titre :
Attaques et preuves de sécurité des protocoles d'échange de clés authentifiés
Titre traduit :
[en] Attacks and Security Proofs of Password Authenticated Key-Exchange Protocols
Date de soutenance :
15 septembre 2021
Nombre de pages :
103+33
Institution :
Unilu - University of Luxembourg, Esch-sur-Alzette, Luxembourg
Intitulé du diplôme :
DOCTEUR DE L’UNIVERSITÉ DU LUXEMBOURG EN INFORMATIQUE
Promoteur :
RYAN, Peter Y A 
Naccache, David
Président du jury :
Membre du jury :
Abdalla, Michel
Joye, Marc
Diffie, Whitfield
Gjøsteen, Kristian
Barbosa, Manuel
Focus Area :
Security, Reliability and Trust
Disponible sur ORBilu :
depuis le 28 septembre 2021

Statistiques


Nombre de vues
418 (dont 62 Unilu)
Nombre de téléchargements
294 (dont 30 Unilu)

Bibliographie


Publications similaires



Contacter ORBilu