Provably secure KEM-based protocols over unauthenticated channels

In this paper we propose a number of KEM-based protocols to establish a shared secret between two parties, and study their resistance over unauthenticated channels. This means analyzing the security of the protocol itself, and its robustness against Man-inthe- Middle attacks. We compare them with their KEX-based counterparts to highlight the differences that arise naturally, due to the nature of KEM constructions, in terms of the protocol itself and the types of attacks that they are subject to. We provide practical go-to KEM-based protocols instances to migrate to, based on the conditions of currently-in-use KEX-based protocols.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/11/2019

Privacy protocols

Security protocols enable secure communication over insecure channels. P...
research
03/20/2021

An Efficient Simulation of Quantum Secret Sharing

In quantum cryptography, quantum secret sharing (QSS) is a fundamental p...
research
08/25/2022

Composable Security of Generalized BB84 Protocols Against General Attacks

Quantum key distribution (QKD) protocols make it possible for two partie...
research
09/16/2020

Perfectly Secure Message Transmission against Rational Adversaries

Secure Message Transmission (SMT) is a two-party cryptographic protocol ...
research
11/12/2020

Machine Learning Interpretability Meets TLS Fingerprinting

Protecting users' privacy over the Internet is of great importance. Howe...
research
04/09/2021

Secret Key Distribution Protocols Based on Self-Powered Timekeeping Devices

In this paper, we present novel secret key distribution protocols using ...
research
08/31/2020

Coding Constructions for Efficient Oblivious Transfer from Noisy Channels

We consider oblivious transfer protocols performed over binary symmetric...

Please sign up or login with your details

Forgot password? Click here to reset