YAK (cryptography)
The YAK is a public-key authenticated key-agreement protocol, proposed by Feng Hao in 2010. [1][2] It is claimed to be the simplest authenticated key exchange protocol among the related schemes, including MQV, HMQV, Station-to-Station protocol, SSL/TLS etc. The authentication is based on public key pairs. As with other protocols, YAK normally requires a Public Key Infrastructure to distribute authentic public keys to the communicating parties. The security of YAK is disputed (see below and the talk page).
Description
Two parties, Alice and Bob, agree on a group [math]\displaystyle{ G }[/math] with generator [math]\displaystyle{ g }[/math] of prime order [math]\displaystyle{ q }[/math] in which the discrete log problem is hard. Typically a Schnorr group is used. In general, YAK can use any prime order group that is suitable for public key cryptography, including elliptic curve cryptography. Let [math]\displaystyle{ g^a }[/math] be Alice's long-term public key and [math]\displaystyle{ g^b }[/math] be Bob's. The protocol executes in one round:
Alice selects [math]\displaystyle{ x \in_\text{R} [0, q-1] }[/math] and sends out [math]\displaystyle{ g^x }[/math] together with a zero-knowledge proof (using for example Schnorr non-interactive zero-knowledge proof as described in RFC 8235) for the proof of the exponent [math]\displaystyle{ x }[/math]. Similarly, Bob selects [math]\displaystyle{ y \in_\text{R} [0, q-1] }[/math] and sends out [math]\displaystyle{ g^{y} }[/math] together with a zero-knowledge proof for the proof of the exponent [math]\displaystyle{ y }[/math]. Here, the notation [math]\displaystyle{ \in_\text{R} }[/math] denotes an element selected randomly with uniform probability.
The above communication can be completed in one round as neither party depends on the other. When it finishes, Alice and Bob verify the received zero-knowledge proofs. Alice then computes [math]\displaystyle{ K = (g^{y} g^{b}) ^ {x + a}= g^{(x + a) (y + b)} }[/math]. Similarly, Bob computes [math]\displaystyle{ K = (g^{x} g^{a}) ^ {y + b} = g^{(x + a) (y + b)} }[/math]. With the same keying material [math]\displaystyle{ K }[/math], Alice and Bob can derive a session key using a cryptographic hash function: [math]\displaystyle{ \kappa = H(K) }[/math].
Security properties
The use of well-established zero-knowledge proof primitives such as Schnorr's scheme greatly simplifies the security proofs. Given that the underlying zero knowledge proof primitive is secure, the YAK protocol aims to satisfy the following properties. [2]
- Private key security – An attacker cannot learn the user's static private key even if he is able to learn all session-specific secrets in any compromised session.
- Forward secrecy – Session keys that were securely established in the past uncorrupted sessions will remain incomputable in the future even when both users' static private keys are disclosed.
- Session key security – An attacker cannot compute the session key if he impersonates a user but has no access to the user's private key.
The security claims in the original YAK paper [2] are based on the Computational Diffie-Hellman assumption in a random oracle model.
Cryptanalysis
In 2015, Toorani mentioned that "the YAK protocol lacks joint key control and perfect forward secrecy attributes and is vulnerable to some attacks including unknown key-share and key-replication attacks" [3] to which Hao has a different opinion.[4]
In 2020, Mohammad mentioned that YAK protocol cannot withstand the known key security attack which leads to a new key compromise impersonation attack where an adversary is allowed to reveal both the shared static secret key between two parties and the ephemeral private key of the initiator. The author also proposed an improved protocol to remedy these attacks and the previous attacks mentioned by Toorani on the YAK protocol, and the proposed protocol uses a verification mechanism that provides entity authentication and key confirmation. The author showed that the proposed protocol is secure in the proposed formal security model under the gap Diffie‐Hellman assumption and the random oracle assumption. Moreover, the security of the proposed protocol and attacks on the YAK protocol were verified by the Scyther tool. [5] Mohammad's paper is discussed in the talk page.
References
- ↑ Hao, Feng (2010). "On Robust Key Agreement Based on Public Key Authentication". 14th Conference on Financial Cryptography and Data Security. Tenerife, Spain. pp. 383–390. https://www.dcs.warwick.ac.uk/~fenghao/files/YAK.pdf.
- ↑ 2.0 2.1 2.2 Hao, Feng (18 April 2012). "On robust key agreement based on public key authentication" (in en). Security and Communication Networks 7 (1): 77–87. doi:10.1002/sec.550. ISSN 1939-0122. https://eprint.iacr.org/2010/136.pdf.
- ↑ Toorani, Mohsen (30 October 2015). "Cryptanalysis of a robust key agreement based on public key authentication". Security and Communication Networks 9: 19–26. doi:10.1002/sec.1373. ISSN 1939-0122.
- ↑ Hao, Feng (2019). "Comments on "Cryptanalysis of a robust key agreement based on public key authentication"". https://www.dcs.warwick.ac.uk/~fenghao/files/comments-on-cryptanalysis.pdf.
- ↑ Mohammad, Zeyad (11 March 2020). "Cryptanalysis and improvement of the YAK protocol with formal security proof and security verification via Scyther". International Journal of Communication Systems 33 (9): e4386. doi:10.1002/dac.4386. ISSN 1099-1131. https://onlinelibrary.wiley.com/doi/full/10.1002/dac.4386.
Original source: https://en.wikipedia.org/wiki/YAK (cryptography).
Read more |