首页> 外文期刊>ACM transactions on computational logic >Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability
【24h】

Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability

机译:基于不可区分性的计算完整符号攻击者的验证方法

获取原文
获取原文并翻译 | 示例

摘要

In recent years, a new approach has been developed for verifying security protocols with the aim of combining the benefits of symbolic attackers and the benefits of unconditional soundness: the technique of the computationally complete symbolic attacker of Bana and Comon (BC) [8]. In this article, we argue that the real breakthrough of this technique is the recent introduction of its version for indistinguishability [9], because, with the extensions we introduce here, for the first time, there is a computationally sound symbolic technique that is syntactically strikingly simple, to which translating standard computational security notions is a straightforward matter, and that can be effectively used for verification of not only equivalence properties but trace properties of protocols as well. We first fully develop the core elements of this newer version by introducing several new axioms. We illustrate the power and the diverse use of the introduced axioms on simple examples first. We introduce an axiom expressing the Decisional Diffie-Hellman property. We analyze the Diffie-Hellman key exchange, both in its simplest form and an authenticated version as well. We provide computationally sound verification of real-or-random secrecy of the Diffie-Hellman key exchange protocol for multiple sessions, without any restrictions on the computational implementation other than the DDH assumption. We also show authentication for a simplified version of the station-to-station protocol using UF-CMA assumption for digital signatures. Finally, we axiomatize IND-CPA, IND-CCA1, and IND-CCA2 security properties and illustrate their usage. We have formalized the axiomatic system in an interactive theorem prover, Coq, and have machine-checked the proofs of various auxiliary theorems and security properties of Diffie-Hellman and station-to-station protocol.
机译:近年来,已经开发出一种用于验证安全协议的新方法,其目的是结合符号攻击者的好处和无条件健全的好处:Bana and Comon(BC)的计算完全符号攻击者的技术[8]。在本文中,我们认为该技术的真正突破是针对不可区分性的最新版本[9],因为随着我们在此引入的扩展,这是第一次在语法上具有计算上合理的符号技术非常简单,将标准的计算安全性概念转换为一个简单的问题,并且不仅可以有效地用于验证等效性,而且还可以有效地验证协议的跟踪性。我们首先通过引入一些新的公理来充分开发此较新版本的核心元素。我们首先通过简单的例子说明引入的公理的功能和多样性。我们引入了一个表示Decision Diffie-Hellman属性的公理。我们以最简单的形式以及经过身份验证的版本来分析Diffie-Hellman密钥交换。我们对多个会话的Diffie-Hellman密钥交换协议的真实或随机保密性提供了计算合理的验证,除DDH假设外,对计算实现没有任何限制。我们还显示了使用UF-CMA假定进行数字签名的简化的站到站协议版本的身份验证。最后,我们对IND-CPA,IND-CCA1和IND-CCA2安全属性进行公理化,并说明它们的用法。我们已经在互动定理证明人Coq中将公理化系统形式化,并已对Diffie-Hellman的各种辅助定理和安全性以及站间协议进行了机器检查。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号