TY - GEN
T1 - A Secure Authenticated Key Agreement Scheme Resilient Against Quantum Attacks
AU - Palaniswamy, Basker
AU - Chen, Ting Yu
AU - Karati, Arijit
N1 - Publisher Copyright:
© 2024 ACM.
PY - 2024/7/19
Y1 - 2024/7/19
N2 - The rise of Web 3.0 has propelled the Internet to new heights of development. However, post-quantum protocols are in high demand to ensure the utmost security to keep pace with the advancements. Our solution is upgrading the traditional synchronous authenticated identity identification and key agreement protocol. Specifically, we have developed an asymmetric key version of the quantum-safe Needham-Schroeder protocol. The proposed protocol achieves forward secrecy, which the classical Needham-Schroeder lacks. Using the highly flexible universal composability framework (iUC), we have analyzed the security of the protocol and achieved mutual authentication and session key security for an unbounded number of sessions. Our informal security analysis confirms that the proposed protocol resists known attacks such as replay and masquerading. Besides, it satisfies security goals, including known-key secrecy and ephemeral secret key leakage. Our modular solution can upgrade practical applications that rely on the traditional Needham-Schroeder protocol and its derivatives to the post-quantum era.
AB - The rise of Web 3.0 has propelled the Internet to new heights of development. However, post-quantum protocols are in high demand to ensure the utmost security to keep pace with the advancements. Our solution is upgrading the traditional synchronous authenticated identity identification and key agreement protocol. Specifically, we have developed an asymmetric key version of the quantum-safe Needham-Schroeder protocol. The proposed protocol achieves forward secrecy, which the classical Needham-Schroeder lacks. Using the highly flexible universal composability framework (iUC), we have analyzed the security of the protocol and achieved mutual authentication and session key security for an unbounded number of sessions. Our informal security analysis confirms that the proposed protocol resists known attacks such as replay and masquerading. Besides, it satisfies security goals, including known-key secrecy and ephemeral secret key leakage. Our modular solution can upgrade practical applications that rely on the traditional Needham-Schroeder protocol and its derivatives to the post-quantum era.
KW - Authentication
KW - Frodo
KW - Needham-Schroeder protocol
KW - Quantum-resistant authentication
KW - Quantum-safe authentication
KW - Universal composability
UR - https://www.scopus.com/pages/publications/85203836341
U2 - 10.1145/3686625.3686634
DO - 10.1145/3686625.3686634
M3 - Conference proceeding
AN - SCOPUS:85203836341
T3 - ACM International Conference Proceeding Series
SP - 46
EP - 55
BT - IECC 2024 - 2024 6th International Electronics Communication Conference
PB - Association for Computing Machinery
T2 - 6th International Electronics Communication Conference, IECC 2024
Y2 - 19 July 2024 through 21 July 2024
ER -