Security requirements for PAKE

Any PAKE protocol should meet the following requirements:

  • Off-line dictionary attack resistance: It does NOT leak any information for passive/active attackers to allow them to perform offline-exhaustive search to find the private secrets.
  • On-line dictionary attack resistance: It gives an active attacker only one chance to test the private secret per protocol.
  • Forward secrecy: It keeps the session key secure even the private secrets is leaked later.
  • Known-session security: If one session key is leaked, it does NOT affect to other established session keys.

We will introduce them in following contents. Nevertheless, before reading them, we should first have some basic ideas about what is the passive attacker and active attacker.

Passive Attacker and Active Attacker

We get started from picking up some knowledge of the attackers

Passive Attacker: Eve, a eavesdropper

passive-attacker Suppose Eve is a passive attacker for the communication between Alice and Bob, then she can see all messages on the channel but she can't modify them.

There are so many potential passive attackers in the real world network, for example, The Internet provider, the government, WiFi sniffer, Someone else on the same network as you.

If your don't encrypt your messages on networks, it's easy to know what youtube you are watching, your bank accounts, your credit card numbers, or other personal information.

Active Attacker: Eve

active-attacker

The active attacker will talk to your system directly. If Eve is active attacker, then she will interact with Alice or Bob directly. She will try to build a protocol with Alice by pretending to be Bob to gain access or to gain greater privileges than she is authorized for. She might randomly guessing the passphrase that Alice use to authenticate Bob.

To prevent from this, we usually limit the number to attempts for authentication or building connection (e.g., You have only three attempts to login to your accounts).

To get more detail, please see types of attacks on WiKi.

Active attacker in PAKE

The active attacker in PAKE means that she is able to directly engage in key exchange.

Off-line Dictionary Attack Resistance

No matter the attacker is active or passive, the communication between parties must NOT leak any data that allows attackers to learn the private secret by performing offline-exhaustive search.

For example, hash value might leak some information about the private data. If the attacker know what hash function you used, then he can list all of the pairs to crack your private data by searching the matched hash value (Given hash value: 'ujm', then the private data 'n' can be found).

private data hash value
0 qaz
1 wsx
.... ...
n ujm
..... .......

On-line Dictionary Attack Resistance

If the attacker directly start sending a key exchange request, there is no way to prevent that the attacker tries a guess of the private secrets. However, the attacker should have only one try per communication, and the successive failed attempts should be easily detected and then blocked.

Forward Secrecy

After running PAKE protocol, the engaging parties will have a shared secret key. However, no one can guarantee that this shared secret won't be disclosed. The past session keys must be protected when the the shared secret is later leaked.

Known-session Security

If an attacker can compromise a session, then all the session-specific secrets may be leaked. Nevertheless, the impact should be minimized. The security of other established sessions must NOT be affected by the compromised session.

results matching ""

    No results matching ""