IACR News item: 21 May 2015
Jiangshan Yu, Mark Ryan, Cas Cremers
ePrint ReportWe develop a new protocol concept that allows the device owner to detect if another party is using the device\'s long-term key. We achieve this by making it necessary for uses of the key to be inserted in an append-only log, which the device owner can interrogate. We propose a multi-device messaging protocol that exploits our concept to allow users to detect unauthorised usage of their device keys. We prove the main properties of our protocol using the Tamarin prover.
The methods we introduce are not intended to replace existing methods used to keep keys safe (such as hardware devices or careful procedures). Rather, our methods provide a useful and effective additional layer of security.
Additional news items may be found on the IACR news page.