Security proof with dishonest keys

Hubert Comon-Lundh 1 Véronique Cortier 2 Guillaume Scerri 1, 2
1 SECSI - Security of information systems
LSV - Laboratoire Spécification et Vérification [Cachan], ENS Cachan - École normale supérieure - Cachan, Inria Saclay - Ile de France, CNRS - Centre National de la Recherche Scientifique : UMR8643
2 CASSIS - Combination of approaches to the security of infinite states systems
FEMTO-ST - Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies, Inria Nancy - Grand Est, LORIA - FM - Department of Formal Methods
Abstract : Symbolic and computational models are the two families of models for rigorously analysing security protocols. Symbolic models are abstract but offer a high level of automation while computational models are more precise but security proof can be tedious. Since the seminal work of Abadi and Rogaway, a new direction of research aims at reconciling the two views and many \emphsoundness results establish that symbolic models are actually sound w.r.t. computational models. \par This is however not true for the prominent case of encryption. Indeed, all existing soundness results assume that the adversary only uses honestly generated keys. While this assumption is acceptable in the case of asymmetric encryption, it is clearly unrealistic for symmetric encryption. In this paper, we provide with several examples of attacks that do not show-up in the classical Dolev-Yao model, and that do not break the IND-CPA nor INT-CTXT properties of the encryption scheme. Our main contribution is to show the first soundness result for symmetric encryption and arbitrary adversaries. We consider arbitrary indistinguishability properties and an unbounded number of sessions. This result relies on an extension of the symbolic model, while keeping standard security assumptions: IND-CPA and IND-CTXT for the encryption scheme.
Type de document :
Communication dans un congrès
Pierpaolo Degano and Joshua D. Guttman. 1st International Conference on Principles of Security and Trust (POST'12), Mar 2012, Tallinn, Estonia. Springer, 7215, pp.149--168, 2012, Lecture Notes in Computer Science. 〈10.1007/978-3-642-28641-4_9〉
Liste complète des métadonnées

https://hal.inria.fr/hal-00732909
Contributeur : Véronique Cortier <>
Soumis le : lundi 17 septembre 2012 - 13:29:13
Dernière modification le : jeudi 15 février 2018 - 08:48:14

Lien texte intégral

Identifiants

Citation

Hubert Comon-Lundh, Véronique Cortier, Guillaume Scerri. Security proof with dishonest keys. Pierpaolo Degano and Joshua D. Guttman. 1st International Conference on Principles of Security and Trust (POST'12), Mar 2012, Tallinn, Estonia. Springer, 7215, pp.149--168, 2012, Lecture Notes in Computer Science. 〈10.1007/978-3-642-28641-4_9〉. 〈hal-00732909〉

Partager

Métriques

Consultations de la notice

351