Skip to main content

Showing 1–22 of 22 results for author: Mitchell, C J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.03654  [pdf, ps, other

    cs.CR

    Integrity-protecting block cipher modes -- Untangling a tangled web

    Authors: Chris J Mitchell

    Abstract: This paper re-examines the security of three related block cipher modes of operation designed to provide authenticated encryption. These modes, known as PES-PCBC, IOBC and EPBC, were all proposed in the mid-1990s. However, analyses of security of the latter two modes were published more recently. In each case one or more papers describing security issues with the schemes were eventually published,… ▽ More

    Submitted 17 June, 2024; v1 submitted 6 March, 2024; originally announced March 2024.

    Comments: Minor typos fixed

  2. arXiv:2101.08132  [pdf, ps, other

    cs.CR

    The (in)security of some recently proposed lightweight key distribution schemes

    Authors: Chris J Mitchell

    Abstract: Two recently published papers propose some very simple key distribution schemes designed to enable two or more parties to establish a shared secret key with the aid of a third party. Unfortunately, as we show, most of the schemes are inherently insecure and all are incompletely specified - moreover, claims that the schemes are inherently lightweight are shown to be highly misleading. We also brief… ▽ More

    Submitted 13 March, 2021; v1 submitted 20 January, 2021; originally announced January 2021.

    Comments: This version adds a brief critique of a related paper on secure multiparty computation

  3. arXiv:2009.09278  [pdf, ps, other

    cs.CR

    Two closely related insecure noninteractive group key establishment schemes

    Authors: Chris J Mitchell

    Abstract: Serious weaknesses in two very closely related group authentication and group key establishment schemes are described. Simple attacks against the group key establishment part of the schemes are described, which strongly suggest that the schemes should not be used.

    Submitted 7 March, 2021; v1 submitted 19 September, 2020; originally announced September 2020.

    Comments: Paper updated to describe an attack on a closely related scheme

  4. arXiv:2005.05376  [pdf, ps, other

    cs.CR

    Provably insecure group authentication: Not all security proofs are what they claim to be

    Authors: Chris J Mitchell

    Abstract: A paper presented at the ICICS 2019 conference describes what is claimed to be a `provably secure group authentication [protocol] in the asynchronous communication model'. We show here that this is far from being the case, as the protocol is subject to serious attacks. To try to explain this troubling case, an earlier (2013) scheme on which the ICICS 2019 protocol is based was also examined and fo… ▽ More

    Submitted 9 June, 2021; v1 submitted 11 May, 2020; originally announced May 2020.

    Comments: The previous versions of the paper contained an incorrect description of the ICICS 2019 scheme. This has been corrected. The attack has also been changed so that it applies to the correct version of the scheme. The main conclusions are unchanged

  5. arXiv:2005.04434  [pdf, ps, other

    cs.CR

    How not to secure wireless sensor networks revisited: Even if you say it twice it's still not secure

    Authors: Chris J Mitchell

    Abstract: Two recent papers describe almost exactly the same group key establishment protocol for wireless sensor networks. Quite part from the duplication issue, we show that both protocols are insecure and should not be used - a member of a group can successfully impersonate the key generation centre and persuade any other group member to accept the wrong key value. This breaks the stated objectives of th… ▽ More

    Submitted 20 November, 2020; v1 submitted 9 May, 2020; originally announced May 2020.

    Comments: Minor typos fixed

  6. arXiv:2005.00862  [pdf, ps, other

    cs.CR

    Who Needs Trust for 5G?

    Authors: Chris J Mitchell

    Abstract: There has been much recent discussion of the criticality of the 5G infrastructure, and whether certain vendors should be able to supply 5G equipment. The key issue appears to be about trust, namely to what degree the security and reliability properties of 5G equipment and systems need to be trusted, and by whom, and how the necessary level of trust might be obtained. In this paper, by considering… ▽ More

    Submitted 2 May, 2020; originally announced May 2020.

  7. arXiv:2004.05597  [pdf, ps, other

    cs.CR

    How not to secure wireless sensor networks: A plethora of insecure polynomial-based key pre-distribution schemes

    Authors: Chris J Mitchell

    Abstract: Three closely-related polynomial-based group key pre-distribution schemes have recently been proposed, aimed specifically at wireless sensor networks. The schemes enable any subset of a predefined set of sensor nodes to establish a shared secret key without any communications overhead. It is claimed that these schemes are both secure and lightweight, i.e. making them particularly appropriate for n… ▽ More

    Submitted 5 October, 2020; v1 submitted 12 April, 2020; originally announced April 2020.

    Comments: This version adds a brief analysis of a recently published group authentication scheme very closely related to one of the three analysed key pre-distribution schemes

  8. arXiv:2003.14356  [pdf, ps, other

    cs.CR

    Yet another insecure group key distribution scheme using secret sharing

    Authors: Chris J Mitchell

    Abstract: A recently proposed group key distribution scheme known as UMKESS, based on secret sharing, is shown to be insecure. Not only is it insecure, but it does not always work, and the rationale for its design is unsound. UMKESS is the latest in a long line of flawed group key distribution schemes based on secret sharing techniques.

    Submitted 18 November, 2020; v1 submitted 31 March, 2020; originally announced March 2020.

    Comments: Minor modifications to provide extra background

    ACM Class: E.3

  9. arXiv:1911.07583  [pdf, other

    cs.CR

    The impact of quantum computing on real-world security: A 5G case study

    Authors: Chris J Mitchell

    Abstract: This paper provides a detailed analysis of the impact of quantum computing on the security of 5G mobile telecommunications. This involves considering how cryptography is used in 5G, and how the security of the system would be affected by the advent of quantum computing. This leads naturally to the specification of a series of simple, phased, recommended changes intended to ensure that the security… ▽ More

    Submitted 13 December, 2019; v1 submitted 18 November, 2019; originally announced November 2019.

    Comments: The latest version corrects a couple of minor errors and adds a further reference

  10. arXiv:1906.09330  [pdf, ps, other

    cs.CR

    The Saeed-Liu-Tian-Gao-Li authenticated key agreement protocol is insecure

    Authors: Chris J Mitchell

    Abstract: A recently proposed authenticated key agreement protocol is shown to be insecure. In particular, one of the two parties is not authenticated, allowing an active man in the middle opponent to replay old messages. The protocol is essentially an authenticated Diffie-Hellman key agreement scheme, and the lack of authentication allows an attacker to replay old messages and have them accepted. Moreover,… ▽ More

    Submitted 21 June, 2019; originally announced June 2019.

  11. Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking

    Authors: Nasser Mohammed Al-Fannah, Wanpeng Li, Chris J Mitchell

    Abstract: Browser fingerprinting is a relatively new method of uniquely identifying browsers that can be used to track web users. In some ways it is more privacy-threatening than tracking via cookies, as users have no direct control over it. A number of authors have considered the wide variety of techniques that can be used to fingerprint browsers; however, relatively little information is available on how… ▽ More

    Submitted 23 May, 2019; originally announced May 2019.

  12. arXiv:1901.08960  [pdf, other

    cs.CR

    OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect

    Authors: Wanpeng Li, Chris J Mitchell, Thomas Chen

    Abstract: Millions of users routinely use Google to log in to websites supporting OAuth 2.0 or OpenID Connect; the security of OAuth 2.0 and OpenID Connect is therefore of critical importance. As revealed in previous studies, in practice RPs often implement OAuth 2.0 incorrectly, and so many real-world OAuth 2.0 and OpenID Connect systems are vulnerable to attack. However, users of such flawed systems are t… ▽ More

    Submitted 24 January, 2019; originally announced January 2019.

    Comments: 20 pages, 6 figures. arXiv admin note: substantial text overlap with arXiv:1801.07983

  13. arXiv:1803.05365  [pdf, ps, other

    cs.CR

    The Hsu-Harn-Mu-Zhang-Zhu group key establishment protocol is insecure

    Authors: Chris J Mitchell

    Abstract: A significant security vulnerability in a recently published group key establishment protocol is described. This vulnerability allows a malicious insider to fraudulently establish a group key with an innocent victim, with the key chosen by the attacker. This shortcoming is sufficiently serious that the protocol should not be used.

    Submitted 16 March, 2018; v1 submitted 14 March, 2018; originally announced March 2018.

  14. arXiv:1803.01137  [pdf, ps, other

    cs.CR

    Security issues in a group key establishment protocol

    Authors: Chris J Mitchell

    Abstract: Major shortcomings in a recently published group key establishment protocol are described. These shortcomings are sufficiently serious that the protocol should not be used.

    Submitted 16 March, 2018; v1 submitted 3 March, 2018; originally announced March 2018.

    Comments: arXiv admin note: text overlap with arXiv:1803.05365

  15. arXiv:1801.07983  [pdf, other

    cs.CR

    Mitigating CSRF attacks on OAuth 2.0 and OpenID Connect

    Authors: Wanpeng Li, Chris J Mitchell, Thomas Chen

    Abstract: Many millions of users routinely use their Google, Facebook and Microsoft accounts to log in to websites supporting OAuth 2.0 and/or OpenID Connect-based single sign on. The security of OAuth 2.0 and OpenID Connect is therefore of critical importance, and it has been widely examined both in theory and in practice. Unfortunately, as these studies have shown, real-world implementations of both schem… ▽ More

    Submitted 24 January, 2018; originally announced January 2018.

    Comments: 18 pages, 3 figures

  16. arXiv:1801.06730  [pdf, other

    cs.CR

    Web password recovery --- a necessary evil?

    Authors: Fatma Al Maqbali, Chris J Mitchell

    Abstract: Web password recovery, enabling a user who forgets their password to re-establish a shared secret with a website, is very widely implemented. However, use of such a fall-back system brings with it additional vulnerabilities to user authentication. This paper provides a framework within which such systems can be analysed systematically, and uses this to help gain a better understanding of how such… ▽ More

    Submitted 30 January, 2018; v1 submitted 20 January, 2018; originally announced January 2018.

    Comments: v2. Revised version

  17. arXiv:1703.01959  [pdf, other

    cs.CR

    AutoPass: An Automatic Password Generator

    Authors: Fatma Al Maqbali, Chris J Mitchell

    Abstract: Text password has long been the dominant user authentication technique and is used by large numbers of Internet services. If they follow recommended practice, users are faced with the almost insuperable problem of generating and managing a large number of site-unique and strong (i.e. non-guessable) passwords. One way of addressing this problem is through the use of a password generator, i.e. a cli… ▽ More

    Submitted 8 March, 2017; v1 submitted 6 March, 2017; originally announced March 2017.

    Comments: 22 pages

  18. arXiv:1607.04421  [pdf, ps, other

    cs.CR

    Password Generators: Old Ideas and New

    Authors: Fatma AL Maqbali, Chris J Mitchell

    Abstract: This paper considers password generators, i.e. systems designed to generate site-specific passwords on demand. Such systems are an alternative to password managers. Over the last 15 years a range of password generator systems have been described. This paper proposes the first general model for such systems, and critically examines options for instantiating this model; options considered include al… ▽ More

    Submitted 15 July, 2016; originally announced July 2016.

    Comments: This is the full version of a paper with the same title due to be published in the proceedings of WISTP 2016 in September 2016

    ACM Class: D.4.6; K.6.5

  19. arXiv:1607.00729  [pdf, ps, other

    cs.CR

    Retrofitting mutual authentication to GSM using RAND hijacking

    Authors: Mohammed Shafiul Alam Khan, Chris J Mitchell

    Abstract: As has been widely discussed, the GSM mobile telephony system only offers unilateral authentication of the mobile phone to the network; this limitation permits a range of attacks. While adding support for mutual authentication would be highly beneficial, changing the way GSM serving networks operate is not practical. This paper proposes a novel modification to the relationship between a Subscriber… ▽ More

    Submitted 4 July, 2016; v1 submitted 3 July, 2016; originally announced July 2016.

    Comments: 17 pages, 2 figures

  20. arXiv:1602.06229  [pdf, ps, other

    cs.CR

    On the security of 2-key triple DES

    Authors: Chris J Mitchell

    Abstract: This paper reconsiders the security offered by 2-key triple DES, an encryption technique that remains widely used despite recently being de-standardised by NIST. A generalisation of the 1990 van Oorschot-Wiener attack is described, constituting the first advance in cryptanalysis of 2-key triple DES since 1990. We give further attack enhancements that together imply that the widely used estimate th… ▽ More

    Submitted 17 July, 2016; v1 submitted 19 February, 2016; originally announced February 2016.

    Comments: Typos in v1 fixed

  21. arXiv:1508.01707  [pdf, ps, other

    cs.CR

    Analysing the Security of Google's implementation of OpenID Connect

    Authors: Wanpeng Li, Chris J Mitchell

    Abstract: Many millions of users routinely use their Google accounts to log in to relying party (RP) websites supporting the Google OpenID Connect service. OpenID Connect, a newly standardised single-sign-on protocol, builds an identity layer on top of the OAuth 2.0 protocol, which has itself been widely adopted to support identity management services. It adds identity management functionality to the OAuth… ▽ More

    Submitted 7 August, 2015; originally announced August 2015.

  22. arXiv:1504.03287  [pdf, ps, other

    cs.CR

    Improving Air Interface User Privacy in Mobile Telephony

    Authors: Mohammed Shafiul Alam Khan, Chris J Mitchell

    Abstract: Although the security properties of 3G and 4G mobile networks have significantly improved by comparison with 2G (GSM), significant shortcomings remain with respect to user privacy. A number of possible modifications to 2G, 3G and 4G protocols have been proposed designed to provide greater user privacy; however, they all require significant modifications to existing deployed infrastructures, which… ▽ More

    Submitted 13 April, 2015; originally announced April 2015.