RUS  ENG
Full version
JOURNALS // Prikladnaya Diskretnaya Matematika. Supplement // Archive

Prikl. Diskr. Mat. Suppl., 2024 Issue 17, Pages 51–57 (Mi pdma643)

Mathematical Methods of Cryptography

Related-Key Attacks on Signature-based Authenticated Key Establishment Protocols

E. K. Alekseev, S. N. Kyazhin

Limited Liability Company «Crypto-Pro»

Abstract: We describe impersonation attacks on SIGMA, SIG-DH, and TS3-1 protocols with related keys. The attacks use an attack on the signature with related keys (for example, ECDSA). Attacks differ in adversary capabilities caused by the synthesis principles of protocols: the use of the initiator's identifier as part of the signed message and as part of the first message requires the adversary to have the capability to force an identifier upon registration; the use of the responder's public ephemeral key as part of the signed message requires the adversary to have the capability to compromise future public ephemeral keys.

Keywords: cryptography, cryptographic protocol, authenticated key establishment, related keys, signature.

UDC: 004.056

DOI: 10.17223/2226308X/17/13



© Steklov Math. Inst. of RAS, 2024