Back to Search
Start Over
Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability
- Source :
- ACM Transactions on Computational Logic. 21:1-44
- Publication Year :
- 2019
- Publisher :
- Association for Computing Machinery (ACM), 2019.
-
Abstract
- In recent years, a new approach has been developed for verifying security protocols with the aim of combining the benefits of symbolic attackers and the benefits of unconditional soundness: the technique of the computationally complete symbolic attacker of Bana and Comon (BC) [8]. In this article, we argue that the real breakthrough of this technique is the recent introduction of its version for indistinguishability [9], because, with the extensions we introduce here, for the first time, there is a computationally sound symbolic technique that is syntactically strikingly simple, to which translating standard computational security notions is a straightforward matter, and that can be effectively used for verification of not only equivalence properties but trace properties of protocols as well. We first fully develop the core elements of this newer version by introducing several new axioms. We illustrate the power and the diverse use of the introduced axioms on simple examples first. We introduce an axiom expressing the Decisional Diffie-Hellman property. We analyze the Diffie-Hellman key exchange, both in its simplest form and an authenticated version as well. We provide computationally sound verification of real-or-random secrecy of the Diffie-Hellman key exchange protocol for multiple sessions, without any restrictions on the computational implementation other than the DDH assumption. We also show authentication for a simplified version of the station-to-station protocol using UF-CMA assumption for digital signatures. Finally, we axiomatize IND-CPA, IND-CCA1, and IND-CCA2 security properties and illustrate their usage. We have formalized the axiomatic system in an interactive theorem prover, Coq, and have machine-checked the proofs of various auxiliary theorems and security properties of Diffie-Hellman and station-to-station protocol.
- Subjects :
- Soundness
Theoretical computer science
General Computer Science
Logic
Computer science
Proof assistant
Axiomatic system
0102 computer and information sciences
Cryptographic protocol
Mathematical proof
01 natural sciences
Theoretical Computer Science
First-order logic
Computational Mathematics
010201 computation theory & mathematics
Dolev–Yao model
Axiom
Subjects
Details
- ISSN :
- 1557945X and 15293785
- Volume :
- 21
- Database :
- OpenAIRE
- Journal :
- ACM Transactions on Computational Logic
- Accession number :
- edsair.doi...........d5fc25f5819f2c570c8f213fac44026d
- Full Text :
- https://doi.org/10.1145/3343508