Know Your Enemy: Compromising Adversaries in Protocol Analysis

被引:18
作者
Basin, David [1 ]
Cremers, Cas [2 ]
机构
[1] Swiss Fed Inst Technol, Zurich, Switzerland
[2] Univ Oxford, Oxford OX1 2JD, England
关键词
Security; Verification; Security protocols; adversary models; threat models; automated analysis; KEY-EXCHANGE PROTOCOLS; SECURITY; AUTHENTICATION; VERIFICATION; MODELS;
D O I
10.1145/2658996
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the design and analysis of cryptographic protocols. The framework's rules can be combined to specify different adversary capabilities, capturing different practically-relevant notions of key and state compromise. The resulting adversary models generalize the models currently used in different domains, such as security models for authenticated key exchange. We extend an existing security-protocol analysis tool, Scyther, with our adversary models. This extension systematically supports notions such as weak perfect forward secrecy, key compromise impersonation, and adversaries capable of state-reveal queries. Furthermore, we introduce the concept of a protocol-security hierarchy, which classifies the relative strength of protocols against different adversaries. In case studies, we use Scyther to analyse protocols and automatically construct protocol-security hierarchies in the context of our adversary models. Our analysis confirms known results and uncovers new attacks. Additionally, our hierarchies refine and correct relationships between protocols previously reported in the cryptographic literature.
引用
收藏
页数:31
相关论文
共 54 条
  • [21] Clark J., 1997, SURVEY AUTHENTICATIO
  • [22] Cremers C., 2014, SCYTHER TOOL COMPROM
  • [23] Cremers C., 2013, DES CODES CRYPT
  • [24] Injective synchronisation: An extension of the authentication hierarchy
    Cremers, C. J. F.
    Mauw, S.
    de Vink, E. P.
    [J]. THEORETICAL COMPUTER SCIENCE, 2006, 367 (1-2) : 139 - 161
  • [25] Cremers Cas J. F., 2010, International Journal of Applied Cryptography, V2, P83, DOI 10.1504/IJACT.2010.038304
  • [26] Cremers CJF, 2008, LECT NOTES COMPUT SC, V5123, P414
  • [27] Cremers CJF, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P119
  • [28] GUNTHER CG, 1990, LECT NOTES COMPUT SC, V434, P29
  • [29] Gupta P., 2006, P JOINT WORKSH FDN C, P113
  • [30] Gupta P., 2005, Proceedings of the 2005 ACM Workshop on Formal Methods in Security Engineering, P23