Key assignment and key maintenance in encrypted networks of resource-limited devices may be a challenging task, due to the permanent need of replacing out-of-service devices with new ones and to the consequent need of updating the key information. Recently, Aragona et al. proposed a new cryptographic scheme, ECTAKS, which provides a solution to this design problem by means of a Diffie-Hellman-like key establishment protocol based on elliptic curves and on a prime field. Even if the authors proved some results related to the security of the scheme, the latter still lacks a formal security analysis. In this paper, we address this issue by providing a security proof for ECTAKS in the setting of computational security, assuming that no adversary can solve the underlying discrete logarithm problems with non-negligible success probability.
| Citation: |
| [1] |
R. Aragona, R. Civino, N. Gavioli and M. Pugliese, An authenticated key scheme over elliptic curves for topological networks, preprint, arXiv: 2006.02147. To appear in Journal of Discrete Mathematical Sciences & Cryptography
|
| [2] |
D. Boneh, The decision Diffie-Hellman problem, Algorithmic Number Theory (Portland, OR), Lecture Notes in Comput. Sci., 1423, Springer, (1998), 48-63.
doi: 10.1007/BFb0054851.
|
| [3] |
W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Trans. Inform. Theory, 22 (1976), 644-654.
doi: 10.1109/tit.1976.1055638.
|
| [4] |
S. Marchesani, L. Pomante, M. Pugliese and F. Santucci, Definition and development of a topology-based cryptographic scheme for wireless sensor networks, in Sensor Systems and Software, Springer International Publishing, (2013), 47-64.
doi: 10.1007/978-3-319-04166-7_4.
|
| [5] |
S. Marchesani, L. Pomante, F. Santucci and M. Pugliese, A cryptographic scheme for real-world wireless sensor networks applications, in Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems, Association for Computing Machinery, 2013.
doi: 10.1145/2502524.2502568.
|
| [6] |
M. Pugliese, Managing Security Issues in Advanced Applications of Wireless Sensor Networks, Ph.D thesis, Department of Electrical Engineering and Computer Science, University of L'Aquila, 2008, available at https://mpugliese.webnode.it/_files/200000061-a7608a760b/24.%20phd_thesis.pdf.
|
| [7] |
J. H. Silverman, The Arithmetic of Elliptic Curves, Springer-Verlag, New York, Graduate Texts in Mathematics, 2009.
doi: 10.1007/978-0-387-09494-6.
|
An example of
Target ANT