Attack Algorithm for a Keystore-Based Secret Key Generation Method

A new attack algorithm is proposed for a secure key generation and management method introduced by Yang and Wu. It was previously claimed that the key generation method of Yang and Wu using a keystore seed was information-theoretically secure and could solve the long-term key storage problem in clou...

Full description

Bibliographic Details
Main Authors: Seungjae Chae, Young-Sik Kim, Jong-Seon No, Young-Han Kim
Format: Article
Language:English
Published: MDPI AG 2019-02-01
Series:Entropy
Subjects:
Online Access:https://www.mdpi.com/1099-4300/21/2/212
Description
Summary:A new attack algorithm is proposed for a secure key generation and management method introduced by Yang and Wu. It was previously claimed that the key generation method of Yang and Wu using a keystore seed was information-theoretically secure and could solve the long-term key storage problem in cloud systems, thanks to the huge number of secure keys that the keystone seed can generate. Their key generation method, however, is considered to be broken if an attacker can recover the keystore seed. The proposed attack algorithm in this paper reconstructs the keystore seed of the Yang&#8315;Wu key generation method from a small number of collected keys. For example, when <inline-formula> <math display="inline"> <semantics> <mrow> <mi>t</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics> </math> </inline-formula> and <inline-formula> <math display="inline"> <semantics> <mrow> <mi>l</mi> <mo>=</mo> <msup> <mn>2</mn> <mn>7</mn> </msup> </mrow> </semantics> </math> </inline-formula>, it was previously claimed that more than <inline-formula> <math display="inline"> <semantics> <mrow> <msup> <mn>2</mn> <mn>53</mn> </msup> </mrow> </semantics> </math> </inline-formula> secure keys could be generated, but the proposed attack algorithm can reconstruct the keystone seed based on only 84 collected keys. Hence, the Yang&#8315;Wu key generation method is not information-theoretically secure when the attacker can gather multiple keys and a critical amount of information about the keystone seed is leaked.
ISSN:1099-4300