ISO/IEC 9798プロトコルの安全性評価

Similar documents
橡セキュリティポリシー雛形策定に関する調査報告書

ASF-01

21 Key Exchange method for portable terminal with direct input by user

Information Security Management System ISMS Copyright JIPDEC ISMS,

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63>

<4D F736F F D F81798E518D6C8E9197BF33817A88C38D868B5A8F70834B D31292E646F63>

活用ガイド(ハードウェア編)


「暗号/情報セキュリティ」

B's Recorderマニュアル_B's Recorderマニュアル

B's Recorderマニュアル

untitled


(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1

( )


( ) () 67 ( ) () 69 ( ) ( ) 7 () 7 () 73 ( ) 74 ( ) 75 () 76 () 77 () 78 ( ) 79 ( ) ( ) 8 ( ) 4 8 ( )


<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F E718F9096BC816A5F E646F63>

リテール・バンキング・システムのICカード対応に関する現状とその課題

/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR

/07/ /10/12 I

ISMSクラウドセキュリティ認証の概要

暗号方式委員会報告(CRYPTRECシンポジウム2012)

2

#2 (IISEC)

スライド 1

楕円曲線暗号の整備動向 +楕円暗号の実装状況

untitled


TLS 1.2 TLS TLS iijlab-seminar pd

特集_03-07.Q3C

SEJulyMs更新V7

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking RSA Group Name RSA C

第3 章 電子認証技術に関する国際動向

JJ-90

Table 1 Table 2

YMS-VPN1_User_Manual

°Å¹æ¥Ï¥Ã¥·¥å´Ø¿ô

001†`032 (Page 1)

ESIGN-TSH 1.0 NTT

楕円曲線暗号と RSA 暗号の安全性比較

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking Group Name Implemati


untitled


Block cipher

情報分野のアクセシビリティ標準について

1 TSUCHIYA HOME TSUCHIYA HOME 2

Ł½’¬24flNfix+3mm-‡½‡¹724

untitled

untitled


人間石川馨と品質管理


ICカードに利用される暗号アルゴリズムの安全性について:ENV仕様の実装上の問題点を中心に


暗号プロトコル評価結果 独立行政法人情報通信研究機構 1. プロトコル名 :PKM 2. 関連する標準 IEEE Std e 使用したツール :S

Copyright SATO International All rights reserved. This software is based in part on the work of the Independen

1 1

1

untitled

光学

untitled

ネットショップ・オーナー2 ユーザーマニュアル

EPSON エプソンプリンタ共通 取扱説明書 ネットワーク編

ありがとうございました

EPSON エプソンプリンタ共通 取扱説明書 ネットワーク編

公務員人件費のシミュレーション分析


橡hashik-f.PDF

198


1

新婚世帯家賃あらまし

05[ ]戸田(責)村.indd

/9/ ) 1) 1 2 2) 4) ) ) 2x + y 42x + y + 1) 4) : 6 = x 5) : x 2) x ) x 2 8x + 10 = 0

XMLを基盤とするビジネスプロトコルの動向

PKIの標準化動向と リソースPKI

Proposal of addition of new cipher suites to TLS to support Camellia, EPOC, and PSEC Shiho Moriai NTT Laboratories th

..0.._ e.qxp

法人保険( )

1

4 5 4


h01


.H..01..

CompuSec SW Ver.5.2 アプリケーションガイド(一部抜粋)

WLBARGS-P_-U_Q&A



No.262全ページ

65歳雇用時代の賃金制度のつくり方

Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1


all

HRBusinessReview_vol5

RE-S26A(第1版)

1

Transcription:

ISO/IEC 9798 2011 2 4 ISO/IEC 9798-2 (Mechanisms using symmetric encipherment algorithms), ISO/IEC 9798-3 (Mechanisms using digital signature techniques), ISO/IEC 9798-4 (Mechanisms using a cryptographic check function) 1 ISO/IEC 9798-2, 9798-3, 9798-4 ISO/IEC 9798-2, 9798-3, 9798-4 2 2009 1

3 3.1 forward security 3.2 IOTP DSA, ECDSA, RSASSA-PKCS1-v1 5, RSA-PSS, RSA-OAEP, RSAES-PKCS1-v1 5 [15, 16, 14] IOTP 3.3 Abadi, Needham M.Abadi R.Needham [1] 11 Abadi Needham 2

1. 2. 3. 4. 5. 6. Nonce (Number used once) 7. 8. 9. nonce 10. 11. IOTP 1, 2, 3, 4, 10, 11 4 ISO/IEC 9798-2, 9798-3, 9798-4 4.1 ISO/IEC 9798-2, 9798-3, 9798-4 Time variant parameter ISO/IEC 9798-2, 9798-3, 9798-4 Time variant parameter 3

ISO/IEC 18031 ISO/IEC 9798-2, 9798-3, 9798-4 A, B e K K I U I K UV U V N U U P R U U T N U U Time variant parameter T oken UV U V T U U T V P U U Time variant parameter X Y X Y ss(y 1 Y j ) Y 1 Y j f K (X) K f 4.2 ISO/IEC 9798-2 ISO/IEC 9798-2 Time variant parameter ISO/IEC 18031 Coordinate Universal Clock (UTC) ISO/IEC 9798-1 ISO/IEC 9798-2 Time variant parameter Time variant parameter Time variant parameter Time variant parameter 4.2.1 Mechanism 1-One-pass authentication Mechanism 1-One-pass authentication 1. A = B : T oken AB T oken AB = T ext 2 e KAB (T N A I B T ext 1 ) 1: Mechanism 1-One-pass authentication 4

4.2.2 Mechanism 2-Two-pass authentication Mechanism 2-Two-pass authentication 1. B = A : R B T ext 1 2. A = B : T oken AB T oken AB = T ext 3 e KAB (R B I B T ext 2 ) 2: Mechanism 2-Two-pass authentication 4.2.3 Mechanism 3-Two-pass authentication Mechanism 3-Two-pass authentication 1. A = B : T oken AB 2. B = A : T oken BA T oken AB = T ext 2 e KAB (T N A I B T ext 1 ) T oken BA = T ext 4 e KAB (T N B I B T ext 3 ) 3: Mechanism 3-Two-pass authentication 4.2.4 Mechanism 4-Three-pass authentication Mechanism 4-Three-pass authentication 1. B = A : R B T ext 1 2. A = B : T oken AB 3. B = A : T oken BA T oken AB = T ext 3 e KAB (R A R B I B T ext 2 ) T oken BA = T ext 5 e KAB (R B R A T ext 4 ) 4: Mechanism 4-Three-pass authentication 5

4.2.5 Mechanism 5-Four-pass authentication Mechanism 5-Four-pass authentication 1. A = P : T V P A I B T ext 1 2. P = A : T oken P A 3. A = B : T oken AB 4. B = A : T oken BA T oken P A = T ext 4 e KAP (T V P A K AB I B T ext 3 ) e KBP (T N P K AB I A T ext 2 ) T oken AB = T ext 6 e KBP (T N P K AB I A T ext 2 ) e KBP (T N A I B T ext 5 ) T oken BA = T ext 8 e KAB (T N B I A T ext 7 ) 5: Mechanism 5-Four-pass authentication 4.2.6 Mechanism 6-Five-pass authentication Mechanism 6-Five-pass authentication 1. B = A : R B T ext 1 2. A = P : R A R B I B T ext 2 3. P = A : T oken P A 4. A = B : T oken AB 5. B = A : T oken BA 6. T oken P A = T ext 5 e KAP (R A K AB I B T ext 4 ) e KBP (R B K AB I A T ext 3 ) T oken AB = T ext 7 e KBP (R B K AB I A T ext 3 ) e KAB (R A R B T ext 6 ) T oken BA = T ext 9 e KAB (R B R A T ext 8) 6: Mechanism 6-Five-pass authentication 4.3 ISO/IEC 9798-3 ISO/IEC 9798-3 6

Time variant parameter ISO/IEC 18031 Coordinate Universal Clock (UTC) ISO/IEC 9798-1 ISO/IEC 9798-2 Time variant parameter Time variant parameter Time variant parameter Time variant parameter 4.3.1 Mechanism 1-One-pass authentication Mechanism 1-One-pass authentication 1. A = B : Cert A T oken AB T oken AB = T A B T ext2 ss A ( T A B T ext1) N A N A 7: Mechanism 1-One-pass authentication 4.3.2 Mechanism 2-Two-pass authentication Mechanism 2-Two-pass authentication 1. B = A : R B T ext1 2. A = B : Cert A T oken AB T oken AB = R A R B B T ext3 ss A (R A R B B T ext2) 8: Mechanism 2-Two-pass authentication 4.3.3 Mechanism 3-Two-pass authentication Mechanism 3-Two-pass authentication 7

1. A = B : Cert A T oken AB 2. B = A : Cert B T oken BA T oken AB = T A B T ext2 ss A ( T A B T ext1) N A N A T oken BA = T B N B A T ext4 ss B ( T B N B A T ext3) 9: Mechanism 3-Two-pass authentication 4.3.4 Mechanism 4-Three-pass authentication Mechanism 4-Three-pass authentication 1. B = A : R B T ext1 2. A = B : Cert A T oken AB 3. B = A : Cert B T oken BA T oken AB = R A R B B T ext3 ss A (R A R B B T ext2) T oken BA = R B R A A T ext5 ss B (R B R A A T ext4) 10: Mechanism 4-Three-pass authentication 4.3.5 Mechanism -Two-pass parallel authentication Mechanism 5-Two-pass parallel authentication 1. A = B : Cert A R A T ext1 1. B = A : Cert B R B T ext2 2. B = A : T oken BA 2. A = B : T oken AB T oken AB = R A R B B T ext4 ss A (R A R B B T ext3) T oken BA = R B R A A T ext6 ss B (R B R A A T ext5) 11: Mechanism 5-Two-pass parallel authentication 8

4.3.6 Five pass authentication (initiated by A) Five pass authentication (initiated by A) 1. A = B : R A I A T ext 1 2. B = A : I B T oken BA 3. A = P : R A R B I A I B T ext4 4. P = A : T ext7 T okent A 5. A = B : T oken AB Option 1 T oken AB = T ext 9 ResA ss T (R B ResA T ext5) ss A (R B R A B A T ext8) T oken BA = R A R B T ext3 ss B (B R A R B A T ext2) T oken T A = ResA ResB ss T (R A ResB T ext6) ss T (R B ResA T ext5) Option 2 T oken AB = R A T ext 9 T okent A ss A (R B R A B A T ext8) T oken BA = R A R B T ext3 ss B (B R A R B A T ext2) T oken T A = ResA ResB ss T (R A R B ResA ResB T ext5) I A = A or CertA I B = B or CertB ResA = (CertA Status), (A P A ) or F ailure ResB = (CertB Status), (B P B ) or F ailure 12: Five pass authentication (initiated by A) 4.3.7 Five pass authentication (initiated by B) Five pass authentication (initiated by B) 9

1. B = A : R B I B T ext 1 2. A = T P : R A R A I A I B T ext2 3. T P = A : T ext5 T okent A 4. A = B : I A T okenab 5. B = A : T oken BA Option 1 T oken AB = T ext 7 R A ResA ss T (R B ResA T ext3) ss A (R B R A B A T ext6) T oken BA = R A R B T ext9 ss B (A R A R B B T ext8) T oken T A = ResA ResB ss T (R A ResB T ext4) ss T (R B ResA T ext3) Option 2 T oken AB = R A T ext 7 T okent A ss A (R B R A B A T ext6) T oken BA = R A R B T ext9 ss B (R A R B A B T ext8) T oken T A = ResA ResB ss T (R A R B ResA ResB T ext3) I A = A or CertA I B = B or CertB ResA = (CertA Status), (A P A ) or F ailure ResB = (CertB Status), (B P B ) or F ailure 13: Five pass authentication (initiated by B) 4.4 ISO/IEC 9798-4 ISO/IEC 9798-4 CCF Time variant parameter ISO/IEC 18031 Coordinate Universal Clock (UTC) ISO/IEC 9798-1 ISO/IEC 9798-4 Time variant parameter Time variant parameter Time variant parameter Time variant parameter 10

4.4.1 Mechanism 1-One-pass authentication Mechanism 1-One-pass parallel authentication 1. A = B : T oken AB T oken AB = T A T ext2 f KAB ( T A B T ext1) N A N A 14: Mechanism 1-One-pass authentication 4.4.2 Mechanism 2-Two-pass authentication Mechanism 2-Two-pass parallel authentication 1. B = A : R B T ext1 2. A = B : T oken AB T oken AB = T ext3 f KAB (R B B T ext2) 15: Mechanism 2-Two-pass authentication 4.4.3 Mechanism 3-Two-pass authentication Mechanism 3-Two-pass parallel authentication 11

T oken AB = T oken BA = 1. A = B : T oken AB 2. B = A : T oken BA T A T ext2 f KAB ( T A B T ext1) N A N A T B T ext4 f KAB ( T B A T ext3) N B N B 16: Mechanism 3-Two-pass authentication 4.4.4 Mechanism 4-Three-pass authentication Mechanism 4-Three-pass authentication 1. B = A : R B T ext1 2. A = B : T oken AB 3. B = A : T oken BA T oken AB = R A T ext3 f KAB (R A R B B T ext2) T oken BA = T ext5 f KAB (R B R A T ext4) 17: Mechanism 4-Three-pass authentication 5 ISO/IEC 9798-2, 9798-3, 9798-4 ISO/IEC 9798-2, 9798-3, 9798-4 9798-3 Three-pass mutual authentication [4] 9798-3 Three-pass mutual authentication 9798 1. ISO/IEC 9798-2, 9798-3, 9798-4 ISO/IEC 2. 12

3. ISO/IEC 9798-2, 9798-3, 9798-4 Time variant parameter ISO/IEC 9798-2, 9798-3, 9798-4 [1] M.Abadi and R.Needham, Prudent engineering practice for cryptographic protocols, DEC SRC Technical Report 125, Digital Equipment Corporation (1995) [2] R.Anderson, Security Engineering : A Guide to Buiding Dependable Distributed Systems, John & Wiley Sons (2001) [3] M.Burrows, M.Abadi, and R.Needham, A logic for authentication, SRC Technical Report 39, Digital Equipment Corporation (1989) [4] W.Diffie, P.C.van Oorschot and M.Wiener, Authentication and authenticated key exchanges, Designs, Codes and Cryptography, 2 (1992) 107-125 [5] ISO/IEC Information Technology - Security Technology - Entity Authentication Part 1: General, ISO/IEC JTC 1/SC 27 DIS 9798-1: (1996) [6] ISO/IEC Information Technology - Security Technology - Entity Authentication Part 2: Entity authentication using symmetric techniques, ISO/IEC JTC 1/SC 27 N489 CD 9798-2: (1992) [7] ISO/IEC Information Technology - Security Technology - Entity Authentication Part 2: Entity authentication using symmetric techniques, ISO/IEC JTC 1/SC 27 N739 DIS 9798-2: (1993) 13

[8] ISO/IEC Information Technology - Security Technology - Entity Authentication Part 2: Mechanisms using symmetric encipherment algorithms, ISO/IEC JTC 1/SC 27 N2145 FDIS 9798-2: (1998) [9] ISO/IEC Information Technology - Security Technology - Entity Authentication Part 3: Mechanisms using digital signature techniques, BS ISO/IEC 9798-3: (1998) [10] ISO/IEC Information Technology - Security Technology - Entity Authentication Part 4: Mechanisms using a cryptographic check function, ISO/IEC JTC 1/SC 27 N2289 FDIS 9798-4: (1999) [11] J.Katz and Y.Lindell, Introduction to Modern Cryptography, Chapman & Hall (2008) [12] W.Mao, Modern Cryptography, Prentice Hall (2004) [13] A.J.Menezes, P.C.van Oorschot and S.A.Vanstone, Handbook of Applied Cryptography, CRC Press (1997) [14] DSA NIST FIPS 186-2 (+Change Notice 1) [15] RSA PKCS #1 v2.1: RSA Cryptography Standard [16] ECDSA SEC 1: Elliptic Curve Cryptography(September 20, 2000 Version 1.0) 14