Exploiting Mobility for Key Establishment.

Orcas Island, WA(2006)

引用 3|浏览3
暂无评分
摘要
Despite years of research on security and cryptography, the vast majority of Internet communications are still unencrypted. We argue the blame lies not with users but with the tools they have available to them. Securing a communication channel with encryption is easy - the hard part is distributing keys in the first place. Current solutions rely ultimately on user actions - verification of encryption keys by inspecting either fingerprints or certificates. Instead, we present a model in which keys are established insecurely and automatically confirmed by exchanging cryptographic hashes of the key. To thwart an active attacker, hashes must travel over some path the attacker does not control. To do so, we exploit users' everyday mobility, plus the capabilities of an overlay network, to resend hashes from diverse access points. Initial simulation and field results support our claim that this generates routes sufficiently diverse to foil all but the most powerful attackers, without requiring explicit action on the part of users.
更多
查看译文
关键词
everyday mobility,internet communication,diverse access point,current solution,communication channel,encryption key,hard part,exploiting mobility,powerful attacker,key establishment,cryptographic hash,active attacker,communication channels,key distribution,cryptography,overlay network,internet
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要