Communication publiée dans un ouvrage (Colloques, congrès, conférences scientifiques et actes)
SweetPAKE: Key exchange with decoy passwords
DELERUE ARRIAGA, Afonso; RYAN, Peter Y A; SKROBOT, Marjan
2024In SweetPAKE: Key exchange with decoy passwords
Peer reviewed
 

Documents


Texte intégral
2024-307.pdf
Postprint Auteur (696.36 kB) Licence Creative Commons - Attribution
Télécharger

Tous les documents dans ORBilu sont protégés par une licence d'utilisation.

Envoyer vers



Détails



Mots-clés :
Honeywords; Oblivious PAKE; PAKE; Password-Authenticated Public-Key Encryption; SweetPAKE; Honeyword; Key-exchange; Oblivious password-authenticated key exchange; Password-authenticated key exchange; Password-authenticated public-key encryption; Public-key encryption; Secure channels; Session key; Computational Theory and Mathematics; Computer Networks and Communications; Computer Science Applications
Résumé :
[en] Decoy accounts are often used as an indicator of the compromise of sensitive data, such as password files. An attacker targeting only specific known-to-be-real accounts might, however, remain undetected. A more effective method proposed by Juels and Rivest at CCS’13 is to maintain additional fake passwords associated with each account. An attacker who gains access to the password file is unable to tell apart real passwords from fake passwords, and the attempted usage of a false password immediately sets off an alarm indicating a password file compromise. Password-Authenticated Key Exchange (PAKE) has long been recognised for its strong security guarantees when it comes to low-entropy password authentication and secure channel establishment, without having to rely on the setup of a PKI. In this paper, we introduce SweetPAKE, a new cryptographic primitive that offers the same security guarantees as PAKE for key exchange, while allowing clients with a single password to authenticate against servers with n candidate passwords for that account and establish a secure channel. Additional security properties are identified and formalized to ensure that (a) high-entropy session keys are indistinguishable from random, even if later on the long-term secret password becomes corrupted (forward secrecy); (b) upon password file leakage, an adversary cannot tell apart real from fake passwords; and (c) a malicious client cannot trigger a false alarm. We capture these properties by extending well-established game-based definitions of PAKE. Furthermore, we propose a new UC formulation that comprehensively unifies both SweetPAKE (session key indistinguishability and sugarword indistinguishability) and a related notion known as Oblivious-PAKE. Finally, we propose efficient SweetPAKE and Oblivious-PAKE protocols constructed from Password-Authenticated Public-Key Encryption (PAPKE) that satisfy all the proposed notions.
Disciplines :
Sciences informatiques
Auteur, co-auteur :
DELERUE ARRIAGA, Afonso  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > APSIA
RYAN, Peter Y A  ;  University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)
SKROBOT, Marjan  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > APSIA
Co-auteurs externes :
no
Langue du document :
Anglais
Titre :
SweetPAKE: Key exchange with decoy passwords
Date de publication/diffusion :
juillet 2024
Nom de la manifestation :
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security
Lieu de la manifestation :
Singapore, Singapour
Date de la manifestation :
01-07-2024 => 05-07-2024
Manifestation à portée :
International
Titre de l'ouvrage principal :
SweetPAKE: Key exchange with decoy passwords
Titre traduit de l'ouvrage principal :
[en] SweetPAKE
Maison d'édition :
Association for Computing Machinery, Inc, Etats-Unis
ISBN/EAN :
9798400704826
Pagination :
1017–1033
Peer reviewed :
Peer reviewed
Focus Area :
Security, Reliability and Trust
Projet FnR :
C21/IS/16236053/FuturePass, C21/IS/16221219/ImPAKT
Organisme subsidiant :
ACM SIGSAC
Subventionnement (détails) :
We thank the anonymous reviewers of AsiaCCS 2024 for their comments and suggestions. Afonso Arriaga and Marjan \u0160krobot received support from the Luxembourg National Research Fund (FNR) under the CORE Junior project (C21/IS/16236053/FuturePass). Peter Y.A. Ryan received support from the Luxembourg National Research Fund (FNR) under the CORE project (C21/IS/16221219/ImPAKT). Additionally, we extend our thanks to Steve Meireles for his contribution to the implementation of the proposed protocols.
Disponible sur ORBilu :
depuis le 04 novembre 2024

Statistiques


Nombre de vues
71 (dont 1 Unilu)
Nombre de téléchargements
25 (dont 0 Unilu)

citations Scopus®
 
0
citations Scopus®
sans auto-citations
0
OpenCitations
 
0
citations OpenAlex
 
0
citations WoS
 
0

Bibliographie


Publications similaires



Contacter ORBilu