Classical Authenticated Key Exchange and Quantum Cryptography

Cryptography plays an integral role in secure communication and is usually the strongest link in the chain of security. Yet security problems abound in electronic communication: spyware, phishing, denial of service, and side-channel attacks are still major concerns. The main goal in this thesis is...

Full description

Bibliographic Details
Main Author: Stebila, Douglas
Language:en
Published: 2009
Subjects:
Online Access:http://hdl.handle.net/10012/4295
id ndltd-WATERLOO-oai-uwspace.uwaterloo.ca-10012-4295
record_format oai_dc
spelling ndltd-WATERLOO-oai-uwspace.uwaterloo.ca-10012-42952013-01-08T18:52:09ZStebila, Douglas2009-03-16T20:23:19Z2009-03-16T20:23:19Z2009-03-16T20:23:19Z2009http://hdl.handle.net/10012/4295Cryptography plays an integral role in secure communication and is usually the strongest link in the chain of security. Yet security problems abound in electronic communication: spyware, phishing, denial of service, and side-channel attacks are still major concerns. The main goal in this thesis is to consider how cryptographic techniques can be extended to offer greater defence against these non-traditional security threats. In the first part of this thesis, we consider problems in classical cryptography. We introduce multi-factor password-authenticated key exchange which allows secure authentication and key agreement based on multiple short secrets, such as a long-term password and a one-time response; it can provide an enhanced level of assurance in higher security scenarios because a multi-factor protocol is designed to remain secure even if all but one of the factors has been compromised due to attacks such as phishing or spyware. Next, we consider the integration of denial of service countermeasures with key exchange protocols: by introducing a formal model for denial of service resilience that complements the extended Canetti-Krawczyk model for secure key agreement, we cover a wide range of existing denial of service attacks and prevent them by carefully using client puzzles. Additionally, we look at how side-channel attacks affect certain types of formulae used in elliptic curve cryptography, and demonstrate that information leaked during field operations such as addition, subtraction, and multiplication can be exploited by an attacker. In the second part of this thesis, we examine cryptography in the quantum setting. We argue that quantum key distribution will have an important role to play in future information security infrastructures and will operate best when integrated with the powerful public key infrastructures that are used today. Finally, we present a new look at quantum money and describe a quantum coin scheme where the coins are not easily counterfeited, are locally verifiable, and can be transferred to another party.encryptographyquantum informationClassical Authenticated Key Exchange and Quantum CryptographyThesis or DissertationCombinatorics and OptimizationDoctor of PhilosophyCombinatorics and Optimization
collection NDLTD
language en
sources NDLTD
topic cryptography
quantum information
Combinatorics and Optimization
spellingShingle cryptography
quantum information
Combinatorics and Optimization
Stebila, Douglas
Classical Authenticated Key Exchange and Quantum Cryptography
description Cryptography plays an integral role in secure communication and is usually the strongest link in the chain of security. Yet security problems abound in electronic communication: spyware, phishing, denial of service, and side-channel attacks are still major concerns. The main goal in this thesis is to consider how cryptographic techniques can be extended to offer greater defence against these non-traditional security threats. In the first part of this thesis, we consider problems in classical cryptography. We introduce multi-factor password-authenticated key exchange which allows secure authentication and key agreement based on multiple short secrets, such as a long-term password and a one-time response; it can provide an enhanced level of assurance in higher security scenarios because a multi-factor protocol is designed to remain secure even if all but one of the factors has been compromised due to attacks such as phishing or spyware. Next, we consider the integration of denial of service countermeasures with key exchange protocols: by introducing a formal model for denial of service resilience that complements the extended Canetti-Krawczyk model for secure key agreement, we cover a wide range of existing denial of service attacks and prevent them by carefully using client puzzles. Additionally, we look at how side-channel attacks affect certain types of formulae used in elliptic curve cryptography, and demonstrate that information leaked during field operations such as addition, subtraction, and multiplication can be exploited by an attacker. In the second part of this thesis, we examine cryptography in the quantum setting. We argue that quantum key distribution will have an important role to play in future information security infrastructures and will operate best when integrated with the powerful public key infrastructures that are used today. Finally, we present a new look at quantum money and describe a quantum coin scheme where the coins are not easily counterfeited, are locally verifiable, and can be transferred to another party.
author Stebila, Douglas
author_facet Stebila, Douglas
author_sort Stebila, Douglas
title Classical Authenticated Key Exchange and Quantum Cryptography
title_short Classical Authenticated Key Exchange and Quantum Cryptography
title_full Classical Authenticated Key Exchange and Quantum Cryptography
title_fullStr Classical Authenticated Key Exchange and Quantum Cryptography
title_full_unstemmed Classical Authenticated Key Exchange and Quantum Cryptography
title_sort classical authenticated key exchange and quantum cryptography
publishDate 2009
url http://hdl.handle.net/10012/4295
work_keys_str_mv AT stebiladouglas classicalauthenticatedkeyexchangeandquantumcryptography
_version_ 1716573289687547904