Quantifying the Security Cost of Migrating Protocols to Practice

被引:0
|
作者
Patton, Christopher [1 ]
Shrimpton, Thomas [1 ]
机构
[1] Univ Florida, Florida Inst Cybersecur Res Comp & Informat Sci &, Gainesville, FL 32611 USA
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT I | 2020年 / 12170卷
关键词
Real-world cryptography; Protocol standards; Concrete security; Indifferentiability; KEY; INDIFFERENTIABILITY;
D O I
10.1007/978-3-030-56784-2_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We give a framework for relating the concrete security of a "reference" protocol (say, one appearing in an academic paper) to that of some derived, "real" protocol (say, appearing in a cryptographic standard). It is based on the indifferentiability framework of Maurer, Renner, and Holenstein (MRH), whose application has been exclusively focused upon non-interactive cryptographic primitives, e.g., hash functions and Feistel networks. Our extension of MRH is supported by a clearly defined execution model and two composition lemmata, all formalized in a modern pseudocode language. Together, these allow for precise statements about game-based security properties of cryptographic objects (interactive or not) at various levels of abstraction. As a real-world application, we design and prove tight security bounds for a potential TLS 1.3 extension that integrates the SPAKE2 password-authenticated key-exchange into the handshake.
引用
收藏
页码:94 / 124
页数:31
相关论文
共 4 条
  • [1] Developing Security Protocols by Refinement
    Sprenger, Christoph
    Basin, David
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 361 - 374
  • [2] METHODOLOGY FOR ASSESSING THE SECURITY OF CRYPTOGRAPHIC PROTOCOLS
    Nesterenko, A. Yu
    Semenov, A. M.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2022, (56): : 33 - 82
  • [3] Observational equivalence and security games: Enhancing the formal analysis of security protocols
    Cai, Liujia
    Cai, Guangying
    Lu, Siqi
    Li, Guangsong
    Wang, Yongjuan
    COMPUTERS & SECURITY, 2024, 140
  • [4] Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties
    Schmidt, Benedikt
    Meier, Simon
    Cremers, Cas
    Basin, David
    2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 78 - 94