Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties

被引:134
|
作者
Schmidt, Benedikt [1 ]
Meier, Simon [1 ]
Cremers, Cas [1 ]
Basin, David [1 ]
机构
[1] ETH, Inst Informat Secur, Zurich, Switzerland
关键词
KEY; VERIFICATION; PRODUCTS;
D O I
10.1109/CSF.2012.25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a general approach for the symbolic analysis of security protocols that use Diffie-Hellman exponentiation to achieve advanced security properties. We model protocols as multiset rewriting systems and security properties as first-order formulas. We analyze them using a novel constraint-solving algorithm that supports both falsification and verification, even in the presence of an unbounded number of protocol sessions. The algorithm exploits the finite variant property and builds on ideas from strand spaces and proof normal forms. We demonstrate the scope and the effectiveness of our algorithm on non-trivial case studies. For example, the algorithm successfully verifies the NAXOS protocol with respect to a symbolic version of the eCK security model.
引用
收藏
页码:78 / 94
页数:17
相关论文
共 50 条
  • [1] A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols
    Girol, Guillaume
    Hirschi, Lucca
    Sasse, Ralf
    Jackson, Dennis
    Cremers, Cas
    Basin, David
    PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 1857 - 1874
  • [2] Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
    Chevalier, Y
    Küsters, R
    Rusinowitch, M
    Turuani, M
    FST TCS 2003: FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE, 2003, 2914 : 124 - 135
  • [3] On the security of Diffie-Hellman bits
    Vasco, MIG
    Shparlinski, IE
    CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, 20 : 257 - 268
  • [4] Modeling Diffie-Hellman Derivability for Automated Analysis
    Liskov, Moses
    Thayer, F. Javier
    2014 IEEE 27TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2014, : 232 - 243
  • [5] Decidability for Lightweight Diffie-Hellman Protocols
    Dougherty, Daniel J.
    Guttman, Joshua D.
    2014 IEEE 27TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2014, : 217 - 231
  • [6] Security analysis of the strong Diffie-Hellman problem
    Cheon, Jung Hee
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2006, PROCEEDINGS, 2006, 4004 : 1 - 11
  • [7] Diffie-Hellman, decision Diffie-Hellman, and discrete logarithms
    Maurer, U
    Wolf, S
    1998 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 1998, : 327 - 327
  • [8] On the bit security of the Diffie-Hellman key
    Ian F. Blake
    Theo Garefalakis
    Igor E. Shparlinski
    Applicable Algebra in Engineering, Communication and Computing, 2006, 16 : 397 - 404
  • [9] On the bit security of the Diffie-Hellman key
    Blake, IF
    Garefalakis, T
    Shparlinski, IE
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2006, 16 (06) : 397 - 404
  • [10] Authenticated Diffie-Hellman key agreement protocols
    Blake-Wilson, S
    Menezes, A
    SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 339 - 361