Analysing and Patching SPEKE in ISO/IEC

02/14/2018
by   Feng Hao, et al.
0

Simple Password Exponential Key Exchange (SPEKE) is a well-known Password Authenticated Key Exchange (PAKE) protocol that has been used in Blackberry phones for secure messaging and Entrust's TruePass end-to-end web products. It has also been included into international standards such as ISO/IEC 11770-4 and IEEE P1363.2. In this paper, we analyse the SPEKE protocol as specified in the ISO/IEC and IEEE standards. We identify that the protocol is vulnerable to two new attacks: an impersonation attack that allows an attacker to impersonate a user without knowing the password by launching two parallel sessions with the victim, and a key-malleability attack that allows a man-in-the-middle (MITM) to manipulate the session key without being detected by the end users. Both attacks have been acknowledged by the technical committee of ISO/IEC SC 27, and ISO/IEC 11770-4 revised as a result. We propose a patched SPEKE called P-SPEKE and present a formal analysis in the Applied Pi Calculus using ProVerif to show that the proposed patch prevents both attacks. The proposed patch has been included into the latest revision of ISO/IEC 11770-4 published in 2017.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/01/2020

A remark on MAKE – a Matrix Action Key Exchange

In a recent paper [arXiv:2009.00716], Rahman and Shpilrain proposed a ne...
research
03/25/2022

Supporting tangible multi-factor key exchange in households

A common approach to securing end-to-end connectivity between devices on...
research
01/28/2019

Diffie-Hellman in the Air: A Link Layer Approach for In-Band Wireless Pairing

Key establishment is one fundamental issue in wireless security. The wid...
research
03/16/2020

Formal Methods Analysis of the Secure Remote Password Protocol

We analyze the Secure Remote Password (SRP) protocol for structural weak...
research
11/10/2021

On the efficiency of a general attack against the MOBS cryptosystem

All instances of the semidirect key exchange protocol, a generalisation ...
research
06/08/2018

The Twin Conjugacy Search Problem and Applications

We propose a new computational problem over the noncommutative group, ca...
research
07/18/2023

From Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake

It is universally acknowledged that Wi-Fi communications are important t...

Please sign up or login with your details

Forgot password? Click here to reset