Hi,

I am new to the TLS/SSL protocol.

I am exploring the idea of extending OpenSSL to perform authenticated key exchanges using symmetric techniques running from smart cards and falling back to asymmetric key exchanges in the normal way if the smart cards are not present or do not recognise each other.

The motivation is that authenticated key exchanges based on AES-256 and SHA-512 are considered secure against quantum computing attacks (Shor's and Grover's quantum algorithms) where algorithms such as RSA and ECC are widely considered insecure.

The proposal in its simplest form:
1) Two smart cards each have a randomly selected ID (256-bit random number) and share a 256-bit symmetric key mapped to the pair of ID's 2) One of the smart cards is installed on the server, the other on a client machine
3) The SSL server connects with its smart card, the client does the same
4) The SSL client establishes a connection with the SSL server
5) Somehow the smart cards announce their identities via the modified SSL protocol without interfering with the normal ID process. 6) If the smart cards recognise each others ID the smart cards perform an authenticated key exchange using their shared secret to generate the sessions keys for encryption and message authentication. If this step fails the protocol stops. 7) If the smart cards do not recognise the other's ID the protocol continues using unmodified asymmetric techniques. 8) In some applications the software calling the SSL may make a decision to stop if the smart card key exchange failed.

I'm interested to find out if anyone has attempted something similar and for general feedback from people intimately familiar with the SSL/ TLS protocols.

It is clearly important that the modified version of the SSL protocol remains interoperable with unmodified SSL/TLS implementations and that the modified protocol does not interfere with the stability of the established SSL/TLS user base.

Thanks and best regards,

Benjamin Gittins

Chief Technology Officer
Synaptic Laboratories Limited

W: http://synaptic-labs.com
W: http://vestciphers.com
W: http://hardware-ciphers.com

E: [email protected]
T: +356 9944 9390 (mobile)
TZ: CET (UTC+1)

This email and its zero or more attachments contains confidential material.
If you receive this email in error, please contact me immediately.





______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [email protected]
Automated List Manager                           [email protected]

Reply via email to