Quantifying the Security Cost of Migrating Protocols to Practice

被引:0
|
作者
Patton, Christopher [1 ]
Shrimpton, Thomas [1 ]
机构
[1] Univ Florida, Florida Inst Cybersecur Res Comp & Informat Sci &, Gainesville, FL 32611 USA
来源
关键词
Real-world cryptography; Protocol standards; Concrete security; Indifferentiability; KEY; INDIFFERENTIABILITY;
D O I
10.1007/978-3-030-56784-2_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We give a framework for relating the concrete security of a "reference" protocol (say, one appearing in an academic paper) to that of some derived, "real" protocol (say, appearing in a cryptographic standard). It is based on the indifferentiability framework of Maurer, Renner, and Holenstein (MRH), whose application has been exclusively focused upon non-interactive cryptographic primitives, e.g., hash functions and Feistel networks. Our extension of MRH is supported by a clearly defined execution model and two composition lemmata, all formalized in a modern pseudocode language. Together, these allow for precise statements about game-based security properties of cryptographic objects (interactive or not) at various levels of abstraction. As a real-world application, we design and prove tight security bounds for a potential TLS 1.3 extension that integrates the SPAKE2 password-authenticated key-exchange into the handshake.
引用
收藏
页码:94 / 124
页数:31
相关论文
共 50 条
  • [21] ON THE SECURITY OF RECENT PROTOCOLS
    CLARK, J
    JACOB, J
    INFORMATION PROCESSING LETTERS, 1995, 56 (03) : 151 - 155
  • [22] Refining security protocols
    Sprenger, Christoph
    Basin, David
    JOURNAL OF COMPUTER SECURITY, 2018, 26 (01) : 71 - 120
  • [23] Quantifying information leakage of randomized protocols
    Biondi, Fabrizio
    Legay, Axel
    Malacaria, Pasquale
    Wasowski, Andrzej
    THEORETICAL COMPUTER SCIENCE, 2015, 597 : 62 - 87
  • [24] Migrating group communication protocols to networks with mobile hosts
    El-Gendy, MA
    Baraka, H
    Fahmy, AH
    1998 MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, PROCEEDINGS, 1999, : 74 - 77
  • [25] Quantifying protocols for safe school activities
    Genari, Juliano
    Goedert, Guilherme Tegoni
    Lira, Sergio H. A.
    Oliveira, Krerley
    Barbosa, Adriano
    Lima, Allysson
    Silva, Jose Augusto
    Oliveira, Hugo
    Maciel, Mauricio
    Ledoino, Ismael
    Resende, Lucas J.
    dos Santos, Edmilson Roque
    Marchesin, Dan
    Struchiner, Claudio
    Pereira, Tiago
    PLOS ONE, 2022, 17 (09):
  • [26] Quantifying Information Leakage of Randomized Protocols
    Biondi, Fabrizio
    Legay, Axel
    Malacaria, Pasquale
    Wasowski, Andrzej
    VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION (VMCAI 2013), 2013, 7737 : 68 - 87
  • [27] IoT Security: A review of vulnerabilities and security protocols
    Varma, Ravi Kiran P.
    Priyanka, M.
    Krishna, Vamsi B. S.
    Raju, Subba K., V
    JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, 14 (02): : 509 - 520
  • [28] Developing Low-Cost Testbeds for Enhancing Security Techniques in Wireless Sensor Network Protocols
    O'Mahony, George D.
    Harris, Philip J.
    Murphy, Colin C.
    2019 30TH IRISH SIGNALS AND SYSTEMS CONFERENCE (ISSC), 2019,
  • [29] Information Assurance for security protocols
    Bella, G
    Bistarelli, S
    COMPUTERS & SECURITY, 2005, 24 (04) : 322 - 333
  • [30] PROTOCOLS FOR DATA-SECURITY
    DEMILLO, R
    MERRITT, M
    COMPUTER, 1983, 16 (02) : 39 - 51