Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties

被引:134
|
作者
Schmidt, Benedikt [1 ]
Meier, Simon [1 ]
Cremers, Cas [1 ]
Basin, David [1 ]
机构
[1] ETH, Inst Informat Secur, Zurich, Switzerland
关键词
KEY; VERIFICATION; PRODUCTS;
D O I
10.1109/CSF.2012.25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a general approach for the symbolic analysis of security protocols that use Diffie-Hellman exponentiation to achieve advanced security properties. We model protocols as multiset rewriting systems and security properties as first-order formulas. We analyze them using a novel constraint-solving algorithm that supports both falsification and verification, even in the presence of an unbounded number of protocol sessions. The algorithm exploits the finite variant property and builds on ideas from strand spaces and proof normal forms. We demonstrate the scope and the effectiveness of our algorithm on non-trivial case studies. For example, the algorithm successfully verifies the NAXOS protocol with respect to a symbolic version of the eCK security model.
引用
收藏
页码:78 / 94
页数:17
相关论文
共 50 条
  • [41] The performance of group Diffie-Hellman paradigms
    Hagzan, KS
    Bischof, HP
    ICWN'04 & PCC'04, VOLS, 1 AND 2, PROCEEDINGS, 2004, : 88 - 94
  • [42] Polynomial representations of the Diffie-Hellman mapping
    El Mahassni, E
    Shparlinski, I
    BULLETIN OF THE AUSTRALIAN MATHEMATICAL SOCIETY, 2001, 63 (03) : 467 - 473
  • [43] The square root Diffie-Hellman problem
    Roh, Dongyoung
    Hahn, Sang Geun
    DESIGNS CODES AND CRYPTOGRAPHY, 2012, 62 (02) : 179 - 187
  • [44] Diffie-Hellman Protocol as a Symmetric Cryptosystem
    Burda, Karel
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (07): : 33 - 37
  • [45] The Kernel Matrix Diffie-Hellman Assumption
    Morillo, Paz
    Rafols, Carla
    Villar, Jorge L.
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 729 - 758
  • [46] A polynomial representation of the Diffie-Hellman mapping
    Meidl, W
    Winterhof, A
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2002, 13 (04) : 313 - 318
  • [47] On-The-Fly Diffie-Hellman for IoT
    Diaz Arancibia, Jaime
    Ferrari Smith, Vicente
    Lopez Fenner, Julio
    2019 38TH INTERNATIONAL CONFERENCE OF THE CHILEAN COMPUTER SCIENCE SOCIETY (SCCC), 2019,
  • [48] Elliptic curve Diffie-Hellman cryptosystem in big data cloud security
    Subramanian, E. K.
    Tamilselvan, Latha
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (04): : 3057 - 3067
  • [49] Symbolic protocol analysis with products and Diffie-Hellman exponentiation
    Millen, J
    Shmatikov, V
    16TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2003, : 47 - 61
  • [50] Short exponent Diffie-Hellman problems
    Koshiba, T
    Kurosawa, K
    PUBLIC KEY CRYPTOGRAPHY - PKC 2004, PROCEEDINGS, 2004, 2947 : 173 - 186