Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties

被引:134
|
作者
Schmidt, Benedikt [1 ]
Meier, Simon [1 ]
Cremers, Cas [1 ]
Basin, David [1 ]
机构
[1] ETH, Inst Informat Secur, Zurich, Switzerland
关键词
KEY; VERIFICATION; PRODUCTS;
D O I
10.1109/CSF.2012.25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a general approach for the symbolic analysis of security protocols that use Diffie-Hellman exponentiation to achieve advanced security properties. We model protocols as multiset rewriting systems and security properties as first-order formulas. We analyze them using a novel constraint-solving algorithm that supports both falsification and verification, even in the presence of an unbounded number of protocol sessions. The algorithm exploits the finite variant property and builds on ideas from strand spaces and proof normal forms. We demonstrate the scope and the effectiveness of our algorithm on non-trivial case studies. For example, the algorithm successfully verifies the NAXOS protocol with respect to a symbolic version of the eCK security model.
引用
收藏
页码:78 / 94
页数:17
相关论文
共 50 条
  • [21] An algebraic approach to the verification of a class of Diffie-Hellman protocols
    Delicata, Rob
    Schneider, Steve
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (2-3) : 183 - 196
  • [22] Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem
    Zhang, Fangguo
    PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 219 - 235
  • [23] Research on the Bit Security of Elliptic Curve Diffie-Hellman
    Wei W.
    Chen J.
    Li D.
    Zhang B.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2020, 42 (08): : 1820 - 1827
  • [24] The Diffie-Hellman protocol
    Maurer, UM
    Wolf, S
    DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) : 147 - 171
  • [25] Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption
    Chevalier, Yannick
    Kuesters, Ralf
    Rusinowitch, Michael
    Turuani, Mathieu
    ACM TRANSACTIONS ON COMPUTATIONAL LOGIC, 2008, 9 (04)
  • [26] Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups
    Joux, A
    Nguyen, K
    JOURNAL OF CRYPTOLOGY, 2003, 16 (04) : 239 - 247
  • [27] Research on the Bit Security of Elliptic Curve Diffie-Hellman
    Wei Wei
    Chen Jiazhe
    Li Dan
    Zhang Baofeng
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (08) : 1820 - 1827
  • [28] DIFFIE-HELLMAN TYPE KEY EXCHANGE PROTOCOLS BASED ON ISOGENIES
    Daghigh, H.
    Gilan, R. Khodakaramian
    Shahpar, F. Seifi
    BULLETIN OF THE IRANIAN MATHEMATICAL SOCIETY, 2017, 43 (04) : 77 - 88
  • [29] On the index of the Diffie-Hellman mapping
    Isik, Leyla
    Winterhof, Arne
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2022, 33 (05) : 587 - 595
  • [30] The group Diffie-Hellman problems
    Bresson, E
    Chevassut, O
    Pointcheval, D
    SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 325 - 338