Quantifying the Security Cost of Migrating Protocols to Practice

被引:0
|
作者
Patton, Christopher [1 ]
Shrimpton, Thomas [1 ]
机构
[1] Univ Florida, Florida Inst Cybersecur Res Comp & Informat Sci &, Gainesville, FL 32611 USA
来源
关键词
Real-world cryptography; Protocol standards; Concrete security; Indifferentiability; KEY; INDIFFERENTIABILITY;
D O I
10.1007/978-3-030-56784-2_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We give a framework for relating the concrete security of a "reference" protocol (say, one appearing in an academic paper) to that of some derived, "real" protocol (say, appearing in a cryptographic standard). It is based on the indifferentiability framework of Maurer, Renner, and Holenstein (MRH), whose application has been exclusively focused upon non-interactive cryptographic primitives, e.g., hash functions and Feistel networks. Our extension of MRH is supported by a clearly defined execution model and two composition lemmata, all formalized in a modern pseudocode language. Together, these allow for precise statements about game-based security properties of cryptographic objects (interactive or not) at various levels of abstraction. As a real-world application, we design and prove tight security bounds for a potential TLS 1.3 extension that integrates the SPAKE2 password-authenticated key-exchange into the handshake.
引用
收藏
页码:94 / 124
页数:31
相关论文
共 50 条
  • [1] Hardware Cost Measurement of Lightweight Security Protocols
    Pekka Jäppinen
    Mikko Lampi
    Wireless Personal Communications, 2013, 71 : 1479 - 1486
  • [2] Hardware Cost Measurement of Lightweight Security Protocols
    Jappinen, Pekka
    Lampi, Mikko
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 71 (02) : 1479 - 1486
  • [3] An evaluation of the cost and energy consumption of security protocols in WSNs
    Kabri, Kahina
    Seret, Dominique
    2009 3RD INTERNATIONAL CONFERENCE ON SENSOR TECHNOLOGIES AND APPLICATIONS (SENSORCOMM 2009), 2009, : 49 - 54
  • [4] Impact of Duty Cycle Protocols on Security Cost of IoT
    Alharby, Sultan
    Harris, Nick
    Weddell, Alex
    Reeve, Jeff
    2018 9TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2018, : 25 - 30
  • [5] DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice
    Cheval, Vincent
    Kremer, Steve
    Rakotonirina, Itsaka
    2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, : 529 - 546
  • [6] Quantifying cryptographic techniques in Radio Frequency Identification protocols and ways of remedying the security threats
    Hurjui, Cristina
    Holban, Stefan
    Graur, Adrian
    WSEAS Transactions on Communications, 2010, 9 (07): : 406 - 417
  • [7] Security Framework of Ultralightweight Mutual Authentication Protocols for Low Cost RFID tags
    Khalid, Madiha
    Mujahid, Umar
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND DIGITAL SYSTEMS (C-CODE), 2017, : 26 - 31
  • [8] Game-Theoretic Security of Commitment Protocols under a Realistic Cost Model
    Komatsubara, Tsuyoshi
    Manabe, Yoshifumi
    IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS IEEE AINA 2016, 2016, : 776 - 783
  • [9] From security protocols to systems security
    Monahan, B
    SECURITY PROTOCOLS, 2005, 3364 : 307 - 323
  • [10] Analysis of security protocols
    Durgin, NA
    Mitchell, JC
    CALCULATIONAL SYSTEM DESIGN, 1999, 173 : 369 - 394