Quantifying the Security Cost of Migrating Protocols to Practice

被引:0
|
作者
Patton, Christopher [1 ]
Shrimpton, Thomas [1 ]
机构
[1] Univ Florida, Florida Inst Cybersecur Res Comp & Informat Sci &, Gainesville, FL 32611 USA
来源
关键词
Real-world cryptography; Protocol standards; Concrete security; Indifferentiability; KEY; INDIFFERENTIABILITY;
D O I
10.1007/978-3-030-56784-2_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We give a framework for relating the concrete security of a "reference" protocol (say, one appearing in an academic paper) to that of some derived, "real" protocol (say, appearing in a cryptographic standard). It is based on the indifferentiability framework of Maurer, Renner, and Holenstein (MRH), whose application has been exclusively focused upon non-interactive cryptographic primitives, e.g., hash functions and Feistel networks. Our extension of MRH is supported by a clearly defined execution model and two composition lemmata, all formalized in a modern pseudocode language. Together, these allow for precise statements about game-based security properties of cryptographic objects (interactive or not) at various levels of abstraction. As a real-world application, we design and prove tight security bounds for a potential TLS 1.3 extension that integrates the SPAKE2 password-authenticated key-exchange into the handshake.
引用
收藏
页码:94 / 124
页数:31
相关论文
共 50 条
  • [41] Timed Analysis of Security Protocols
    Szymoniak, Sabina
    Siedlecka-Lamch, Olga
    Kurkowski, Miroslaw
    INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY - ISAT 2016 - PT II, 2017, 522 : 53 - 63
  • [42] A decidable analysis of security protocols
    Rusinowitch, M
    EXPLORING NEW FRONTIERS OF THEORETICAL INFORMATICS, 2004, 155 : 21 - 21
  • [43] Update semantics of security protocols
    Hommersom, A
    Meyer, JJ
    De Vink, E
    SYNTHESE, 2004, 142 (02) : 229 - 267
  • [44] Automated design of security protocols
    Chen, H
    Clark, JA
    Jacob, JL
    CEC: 2003 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-4, PROCEEDINGS, 2003, : 2181 - 2188
  • [45] Proving security protocols correct
    Paulson, Lawrence C.
    Proceedings - Symposium on Logic in Computer Science, 1999, : 370 - 381
  • [46] The changing environment for security protocols
    Needham, RM
    IEEE NETWORK, 1997, 11 (03): : 12 - 15
  • [47] On evaluating the performance of security protocols
    Bodei, C
    Buchholtz, M
    Curti, M
    Degano, P
    Nielson, F
    Nielson, HR
    Priami, C
    PARALLEL COMPUTING TECHNOLOGIES, 2005, 3606 : 1 - 15
  • [48] CryptoNET: Security Management Protocols
    Abbasi, Abdul Ghafoor
    Muftic, Sead
    ADVANCES IN DATA NETWORKS, COMMUNICATIONS, COMPUTERS, 2010, : 15 - 20
  • [49] Comparison of wireless security protocols
    Zhou, T
    Yu, Q
    Liu, H
    CCCT 2003, VOL 5, PROCEEDINGS: COMPUTER, COMMUNICATION AND CONTROL TECHNOLOGIES: II, 2003, : 94 - 99
  • [50] Analyzing Internet security protocols
    Yasinsac, A
    Childs, J
    SIXTH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING, 2001, : 149 - 159