Cargando…

Attack Algorithm for a Keystore-Based Secret Key Generation Method

A new attack algorithm is proposed for a secure key generation and management method introduced by Yang and Wu. It was previously claimed that the key generation method of Yang and Wu using a keystore seed was information-theoretically secure and could solve the long-term key storage problem in clou...

Descripción completa

Detalles Bibliográficos
Autores principales: Chae, Seungjae, Kim, Young-Sik, No, Jong-Seon, Kim, Young-Han
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7514693/
https://www.ncbi.nlm.nih.gov/pubmed/33266927
http://dx.doi.org/10.3390/e21020212
_version_ 1783586646985277440
author Chae, Seungjae
Kim, Young-Sik
No, Jong-Seon
Kim, Young-Han
author_facet Chae, Seungjae
Kim, Young-Sik
No, Jong-Seon
Kim, Young-Han
author_sort Chae, Seungjae
collection PubMed
description A new attack algorithm is proposed for a secure key generation and management method introduced by Yang and Wu. It was previously claimed that the key generation method of Yang and Wu using a keystore seed was information-theoretically secure and could solve the long-term key storage problem in cloud systems, thanks to the huge number of secure keys that the keystone seed can generate. Their key generation method, however, is considered to be broken if an attacker can recover the keystore seed. The proposed attack algorithm in this paper reconstructs the keystore seed of the Yang–Wu key generation method from a small number of collected keys. For example, when [Formula: see text] and [Formula: see text] , it was previously claimed that more than [Formula: see text] secure keys could be generated, but the proposed attack algorithm can reconstruct the keystone seed based on only 84 collected keys. Hence, the Yang–Wu key generation method is not information-theoretically secure when the attacker can gather multiple keys and a critical amount of information about the keystone seed is leaked.
format Online
Article
Text
id pubmed-7514693
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-75146932020-11-09 Attack Algorithm for a Keystore-Based Secret Key Generation Method Chae, Seungjae Kim, Young-Sik No, Jong-Seon Kim, Young-Han Entropy (Basel) Article A new attack algorithm is proposed for a secure key generation and management method introduced by Yang and Wu. It was previously claimed that the key generation method of Yang and Wu using a keystore seed was information-theoretically secure and could solve the long-term key storage problem in cloud systems, thanks to the huge number of secure keys that the keystone seed can generate. Their key generation method, however, is considered to be broken if an attacker can recover the keystore seed. The proposed attack algorithm in this paper reconstructs the keystore seed of the Yang–Wu key generation method from a small number of collected keys. For example, when [Formula: see text] and [Formula: see text] , it was previously claimed that more than [Formula: see text] secure keys could be generated, but the proposed attack algorithm can reconstruct the keystone seed based on only 84 collected keys. Hence, the Yang–Wu key generation method is not information-theoretically secure when the attacker can gather multiple keys and a critical amount of information about the keystone seed is leaked. MDPI 2019-02-23 /pmc/articles/PMC7514693/ /pubmed/33266927 http://dx.doi.org/10.3390/e21020212 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Chae, Seungjae
Kim, Young-Sik
No, Jong-Seon
Kim, Young-Han
Attack Algorithm for a Keystore-Based Secret Key Generation Method
title Attack Algorithm for a Keystore-Based Secret Key Generation Method
title_full Attack Algorithm for a Keystore-Based Secret Key Generation Method
title_fullStr Attack Algorithm for a Keystore-Based Secret Key Generation Method
title_full_unstemmed Attack Algorithm for a Keystore-Based Secret Key Generation Method
title_short Attack Algorithm for a Keystore-Based Secret Key Generation Method
title_sort attack algorithm for a keystore-based secret key generation method
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7514693/
https://www.ncbi.nlm.nih.gov/pubmed/33266927
http://dx.doi.org/10.3390/e21020212
work_keys_str_mv AT chaeseungjae attackalgorithmforakeystorebasedsecretkeygenerationmethod
AT kimyoungsik attackalgorithmforakeystorebasedsecretkeygenerationmethod
AT nojongseon attackalgorithmforakeystorebasedsecretkeygenerationmethod
AT kimyounghan attackalgorithmforakeystorebasedsecretkeygenerationmethod