Security analysis of SM2 key exchange protocol in TPM2.0

被引:20
作者
Zhao, Shijun [1 ]
Xi, Li [1 ]
Zhang, Qianying [1 ]
Qin, Yu [1 ]
Feng, Dengguo [1 ]
机构
[1] Chinese Acad Sci, Inst Software, Beijing 100190, Peoples R China
基金
中国国家自然科学基金;
关键词
authenticated key exchange; SM2 key exchange; provable security; UKS attacks; key-compromise impersonation attacks; CK model; TPM2.0; AGREEMENT;
D O I
10.1002/sec.987
中图分类号
TP [自动化技术、计算机技术];
学科分类号
080201 [机械制造及其自动化];
摘要
The new released trusted platform module (TPM) specification, TPM2.0, adds cryptographic support for key exchange by providing SM2 authenticated key exchange (AKE) application programming interface (API) commands. Xu analyzed the SM2 AKE protocol and found that it was insecure in common computing environment by presenting two types of unknown key share attacks. Here, we present another design weakness of the SM2 AKE protocol, which might cause that the protocol cannot be proven secure in modern security models. We also analyze the security of SM2 AKE protocol in TPM2.0, whose running environment is very different and find that (i) it indeed gets some security improvements through the protection capability provided by the two SM2 AKE commands of TPM2.0 but (ii) it still has some weaknesses, which might lead to unknown key share and key-compromise impersonation attacks because of the bad design of the TPM2.0 application programming interface. We solve the weaknesses of SM2 AKE protocol in TPM2.0 by slightly modifying one SM2 AKE command and finally give a formal proof of our solution in the Canetti and Krawczyk model. Our work shows that TPM2.0 could provide a proven secure SM2 AKE by slightly modifying one command. Copyright (C) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:383 / 395
页数:13
相关论文
共 19 条
[1]
[Anonymous], LNCS
[2]
[Anonymous], 2004, PROC 11 ACM C COMPUT, DOI DOI 10.1109/TSC.2010.60
[3]
[Anonymous], 2 WORKSH SEL AR CRYP
[4]
[Anonymous], 11889 ISOIEC PAS DIS
[5]
[Anonymous], 1998, KEA ALG SPEC
[6]
Barker E, 2007, NIST SPECIAL PUBLICA
[7]
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
[8]
Canetti R, 2002, LECT NOTES COMPUT SC, V2442, P143
[9]
Chen L., 2010, 2010 IEEE IFIP 8 INT, P609
[10]
NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654