DeepAI AI Chat
Log In Sign Up

Breaking and Fixing Unlinkability of the Key Agreement Protocol for 2nd Gen EMV Payments

05/05/2021
by   Ross Horne, et al.
0

To address privacy problems with the EMV standard, EMVco proposed a Blinded Diffie-Hellman key establishment protocol. We point out that active attackers were not previously accounted for in the privacy requirements of this proposed protocol, despite the fact that an active attacker can compromise unlinkability. Here, we adopt a strong definition of unlinkability that does account for active attackers and propose an enhancement of the protocol proposed by EMVco where we make use of Verheul certificates. We prove that our protocol does satisfy strong unlinkability, while preserving authentication.

READ FULL TEXT

page 1

page 2

page 3

page 4

06/21/2019

The Saeed-Liu-Tian-Gao-Li authenticated key agreement protocol is insecure

A recently proposed authenticated key agreement protocol is shown to be ...
07/13/2022

On Post-Quantum Perfect Forward Secrecy in 6G

The standardized Authentication and Key Agreement protocol for 5G networ...
04/09/2021

A Novel Provably Secure Key Agreement Protocol Based On Binary Matrices

In this paper, a new key agreement protocol is presented. The protocol u...
10/02/2019

Sensor Networks in Healthcare: Ensuring Confidentiality and User Anonymity in WBAN

Wireless body area network(WBAN) is becoming more popular in recent year...
05/02/2019

Passive and active attackers in noiseless privacy

Differential privacy offers clear and strong quantitative guarantees for...
12/30/2022

Detecting Forged Kerberos Tickets in an Active Directory Environment

Active Directory is the most popular service to manage users and devices...