Implementing a secure key exchange protocol for openSSL

Security models have been developed over time to examine the security of two-party authenticated key exchange protocols. In 2007, a reasonably strong security model for key exchange protocols has been proposed, namely extended Canetti-Krawczyk model (eCK model), addressing wide range of real-world a...

Full description

Saved in:
Bibliographic Details
Main Authors: Alawatugoda, Janaka, Vivekaanathan, Seralathan, Peiris, Nishen, Wickramasinghe, Chamitha, Chuah, Chai Wen
Format: Article
Language:en
Published: Indonesian Society for Knowledge and Human Development (INSIGHT) 2018
Subjects:
Online Access:http://eprints.uthm.edu.my/5875/1/AJ%202018%20%28633%29.pdf
http://eprints.uthm.edu.my/5875/
http://dx.doi.org/10.18517/ijaseit.8.5.5046
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1833417957116477440
author Alawatugoda, Janaka
Vivekaanathan, Seralathan
Peiris, Nishen
Wickramasinghe, Chamitha
Chuah, Chai Wen
author_facet Alawatugoda, Janaka
Vivekaanathan, Seralathan
Peiris, Nishen
Wickramasinghe, Chamitha
Chuah, Chai Wen
author_sort Alawatugoda, Janaka
building UTHM Library
collection Institutional Repository
content_provider Universiti Tun Hussein Onn Malaysia
content_source UTHM Institutional Repository
continent Asia
country Malaysia
description Security models have been developed over time to examine the security of two-party authenticated key exchange protocols. In 2007, a reasonably strong security model for key exchange protocols has been proposed, namely extended Canetti-Krawczyk model (eCK model), addressing wide range of real-world attack scenarios. They constructed a protocol called NAXOS, that is proven secure in the eCK model. In order to satisfy the eCK security, NAXOS protocol uses a hash function to combine the ephemeral key with the long-term secret key, which is often called as “NAXOS trick”. However, for the NAXOS trick based protocols, the way of leakage modelled in the eCK model leads to an unnatural assumption of leak-free computation of the hash function. In 2015, Alawatugoda, Stebila and Boyd presented a secure and NAXOS trick key exchange protocol, namely protocol P1. In this work, we implement the protocol P1 to be used with the widely-used OpenSSL cryptographic library. OpenSSL implementations are widely used with the real-world security protocol suites, particularly Security Socket Layer and Transport Layer Security. According to our knowledge, this is the first implementation of an eCK-secure protocol for the OpenSSL library. Thus, we open up the direction to use the recent advancements of cryptography for real-world Internet communication.
format Article
id my.uthm.eprints-5875
institution Universiti Tun Hussein Onn Malaysia
language en
publishDate 2018
publisher Indonesian Society for Knowledge and Human Development (INSIGHT)
record_format eprints
spelling my.uthm.eprints-58752022-01-24T06:35:22Z http://eprints.uthm.edu.my/5875/ Implementing a secure key exchange protocol for openSSL Alawatugoda, Janaka Vivekaanathan, Seralathan Peiris, Nishen Wickramasinghe, Chamitha Chuah, Chai Wen TA168 Systems engineering Security models have been developed over time to examine the security of two-party authenticated key exchange protocols. In 2007, a reasonably strong security model for key exchange protocols has been proposed, namely extended Canetti-Krawczyk model (eCK model), addressing wide range of real-world attack scenarios. They constructed a protocol called NAXOS, that is proven secure in the eCK model. In order to satisfy the eCK security, NAXOS protocol uses a hash function to combine the ephemeral key with the long-term secret key, which is often called as “NAXOS trick”. However, for the NAXOS trick based protocols, the way of leakage modelled in the eCK model leads to an unnatural assumption of leak-free computation of the hash function. In 2015, Alawatugoda, Stebila and Boyd presented a secure and NAXOS trick key exchange protocol, namely protocol P1. In this work, we implement the protocol P1 to be used with the widely-used OpenSSL cryptographic library. OpenSSL implementations are widely used with the real-world security protocol suites, particularly Security Socket Layer and Transport Layer Security. According to our knowledge, this is the first implementation of an eCK-secure protocol for the OpenSSL library. Thus, we open up the direction to use the recent advancements of cryptography for real-world Internet communication. Indonesian Society for Knowledge and Human Development (INSIGHT) 2018 Article PeerReviewed text en http://eprints.uthm.edu.my/5875/1/AJ%202018%20%28633%29.pdf Alawatugoda, Janaka and Vivekaanathan, Seralathan and Peiris, Nishen and Wickramasinghe, Chamitha and Chuah, Chai Wen (2018) Implementing a secure key exchange protocol for openSSL. International Journal on Advanced Science, Engineering and Information Technology, 8 (5). pp. 2205-2210. ISSN 2088-5334 http://dx.doi.org/10.18517/ijaseit.8.5.5046
spellingShingle TA168 Systems engineering
Alawatugoda, Janaka
Vivekaanathan, Seralathan
Peiris, Nishen
Wickramasinghe, Chamitha
Chuah, Chai Wen
Implementing a secure key exchange protocol for openSSL
title Implementing a secure key exchange protocol for openSSL
title_full Implementing a secure key exchange protocol for openSSL
title_fullStr Implementing a secure key exchange protocol for openSSL
title_full_unstemmed Implementing a secure key exchange protocol for openSSL
title_short Implementing a secure key exchange protocol for openSSL
title_sort implementing a secure key exchange protocol for openssl
topic TA168 Systems engineering
url http://eprints.uthm.edu.my/5875/1/AJ%202018%20%28633%29.pdf
http://eprints.uthm.edu.my/5875/
http://dx.doi.org/10.18517/ijaseit.8.5.5046
url_provider http://eprints.uthm.edu.my/