Dealing with Dynamic Key Compromise in CryptoVerif - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Pré-Publication, Document De Travail (Preprint/Prepublication) Année : 2023

Dealing with Dynamic Key Compromise in CryptoVerif

Bruno Blanchet

Résumé

CryptoVerif is a mechanized security protocol verifier sound in the computational model. In this paper, we explore and extend its treatment of dynamic key compromise. First, we present a basic treatment of compromise and explain its limitations. Next, we introduce several extensions in order to remove these limitations: improved proof of secrecy; building different proofs for the various properties to prove; removing code that cannot be executed when the adversary breaks the desired security properties; and guessing tested sessions, values, and branches. We illustrate how these extensions improve the treatment of key compromise on protocols ranging from toy examples to filling gaps in previous large case studies including TLS 1.3 and the WireGuard VPN protocol.
Fichier principal
Vignette du fichier
CryptoVerif-compromise.pdf (408.69 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Licence : CC BY - Paternité

Dates et versions

hal-04271666 , version 1 (06-11-2023)

Licence

Paternité

Identifiants

  • HAL Id : hal-04271666 , version 1

Citer

Bruno Blanchet. Dealing with Dynamic Key Compromise in CryptoVerif. 2023. ⟨hal-04271666⟩
33 Consultations
34 Téléchargements

Partager

Gmail Facebook X LinkedIn More