Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols

被引:16
作者
Davis, Hannah [1 ]
Gunther, Felix [2 ]
机构
[1] Univ Calif San Diego, Dept Comp Sci & Engn, La Jolla, CA 92093 USA
[2] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
来源
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2021, PT II | 2021年 / 12727卷
基金
美国国家科学基金会;
关键词
Key exchange; SIGMA; TLS; 1.3; Security bounds; Tightness; DIFFIE-HELLMAN; SECURITY;
D O I
10.1007/978-3-030-78375-4_18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We give new, fully-quantitative and concrete bounds that justify the SIGMA and TLS 1.3 key exchange protocols not just in principle, but in practice. By this we mean that, for standardized elliptic curve group sizes, the overall protocol actually achieves the intended security level. Prior work gave reductions of both protocols' security to the underlying building blocks that were loose (in the number of users and/or sessions), so loose that they gave no guarantees for practical parameters. Adapting techniques by Cohn-Gordon et al. (Crypto 2019), we give reductions for SIGMA and TLS 1.3 to the strong Diffie-Hellman problem which are tight, and prove that this problem is as hard as solving discrete logarithms in the generic group model. Leveraging our tighter bounds, we meet the protocols' targeted security levels when instantiated with standardized curves and improve over prior bounds by up to over 90 bits of security across a range of real-world parameters.
引用
收藏
页码:448 / 479
页数:32
相关论文
共 41 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]  
Abdalla M, 2001, LECT NOTES COMPUT SC, V2020, P143
[3]   Security of the J-PAKE Password-Authenticated Key Exchange Protocol [J].
Abdalla, Michel ;
Benhamouda, Fabrice ;
MacKenzie, Philip .
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, :571-587
[4]   On the Impossibility of Tight Cryptographic Reductions [J].
Bader, Christoph ;
Jager, Tibor ;
Li, Yong ;
Schaege, Sven .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 :273-304
[5]   Tightly-Secure Authenticated Key Exchange [J].
Bader, Christoph ;
Hofheinz, Dennis ;
Jager, Tibor ;
Kiltz, Eike ;
Li, Yong .
THEORY OF CRYPTOGRAPHY (TCC 2015), PT I, 2015, 9014 :629-658
[6]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[7]   Pseudorandom functions revisited: The cascade construction and its concrete security [J].
Bellare, M ;
Canetti, R ;
Krawczyk, H .
37TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1996, :514-523
[8]  
Bellare M., 1994, LNCS, V773, P232, DOI DOI 10.1007/3-540-48329-2_21
[9]  
Bellare M., 2020, INDOCRYPT 2020
[10]  
Bellare M., 1993, P 1 ACM C COMP COMM, P62