Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties

被引:134
|
作者
Schmidt, Benedikt [1 ]
Meier, Simon [1 ]
Cremers, Cas [1 ]
Basin, David [1 ]
机构
[1] ETH, Inst Informat Secur, Zurich, Switzerland
关键词
KEY; VERIFICATION; PRODUCTS;
D O I
10.1109/CSF.2012.25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a general approach for the symbolic analysis of security protocols that use Diffie-Hellman exponentiation to achieve advanced security properties. We model protocols as multiset rewriting systems and security properties as first-order formulas. We analyze them using a novel constraint-solving algorithm that supports both falsification and verification, even in the presence of an unbounded number of protocol sessions. The algorithm exploits the finite variant property and builds on ideas from strand spaces and proof normal forms. We demonstrate the scope and the effectiveness of our algorithm on non-trivial case studies. For example, the algorithm successfully verifies the NAXOS protocol with respect to a symbolic version of the eCK security model.
引用
收藏
页码:78 / 94
页数:17
相关论文
共 50 条
  • [31] On the distribution of the Diffie-Hellman pairs
    Shparlinski, IE
    FINITE FIELDS AND THEIR APPLICATIONS, 2002, 8 (02) : 131 - 141
  • [32] An Algebra for Symbolic Diffie-Hellman Protocol Analysis
    Dougherty, Daniel J.
    Guttman, Joshua D.
    TRUSTWORTHY GLOBAL COMPUTING, TGC 2013, 2013, 8358 : 164 - 181
  • [33] An Alternative Diffie-Hellman Protocol
    Jarpe, Eric
    CRYPTOGRAPHY, 2020, 4 (01) : 1 - 10
  • [34] Variations of Diffie-Hellman problem
    Bao, F
    Deng, RH
    Zhu, HF
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 301 - 312
  • [35] The oracle Diffie-Hellman assumptions and an analysis of DHIES
    Abdalla, M
    Bellare, M
    Rogaway, P
    TOPICS IN CRYPTOLOGY - CT-RAS 2001, PROCEEDINGS, 2001, 2020 : 143 - 158
  • [36] A Quantum Diffie-Hellman Protocol
    Subramaniam, Pranav
    Parakh, Abhishek
    2014 IEEE 11TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2014, : 523 - 524
  • [37] Signed (Group) Diffie-Hellman Key Exchange with Tight Security
    Pan, Jiaxin
    Qian, Chen
    Ringerud, Magnus
    JOURNAL OF CRYPTOLOGY, 2022, 35 (04)
  • [38] Bits security of the elliptic curve Diffie-Hellman secret keys
    Jetchev, Dimitar
    Venkatesan, Ramarathnam
    ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 75 - +
  • [39] Post-quantum Diffie-Hellman and symmetric key exchange protocols
    Li, Xiangdong
    Leung, Lin
    Kwan, Andis Chi-Tung
    Zhang, Xiaowen
    Kahanda, Damikka
    Anshel, Michael
    2006 IEEE INFORMATION ASSURANCE WORKSHOP, 2006, : 382 - +
  • [40] The Diffie-Hellman problem in Lie algebras
    Rafalska, Beata
    Rough Sets and Intelligent Systems Paradigms, Proceedings, 2007, 4585 : 622 - 629