Security Protocol Verification: Symbolic and Computational Models
26 pages
English

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris

Security Protocol Verification: Symbolic and Computational Models

-

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus
26 pages
English
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus

Description

Niveau: Supérieur, Doctorat, Bac+8
Security Protocol Verification: Symbolic and Computational Models Bruno Blanchet INRIA, Ecole Normale Superieure, CNRS, Paris Abstract. Security protocol verification has been a very active research area since the 1990s. This paper surveys various approaches in this area, considering the verification in the symbolic model, as well as the more recent approaches that rely on the computational model or that ver- ify protocol implementations rather than specifications. Additionally, we briefly describe our symbolic security protocol verifier ProVerif and sit- uate it among these approaches. 1 Security Protocols Security protocols are programs that aim at securing communications on in- secure networks, such as Internet, by relying on cryptographic primitives. Se- curity protocols are ubiquitous: they are used, for instance, for e-commerce (e.g., the protocol TLS [109], used for https:// URLs), bank transactions, mobile phone and WiFi networks, RFID tags, and e-voting. However, the de- sign of security protocols is particularly error-prone. This can be illustrated for instance by the very famous Needham-Schroeder public-key protocol [160], in which a flaw was found by Lowe [147] 17 years after its publication. Even though much progress has been made since then, many flaws are still found in current security protocols (see, e.

  • physical attacks

  • syntactic secrecy

  • protocol satisfies

  • equivalences can

  • protocol

  • split into

  • security protocols

  • attacks introduce

  • can easily

  • public key


Sujets

Informations

Publié par
Nombre de lectures 15
Langue English

Extrait

SecurityProtocolVerification:SymbolicandComputationalModelsBrunoBlanchetINRIA,E´coleNormaleSup´erieure,CNRS,Parisblanchet@di.ens.frAbstract.Securityprotocolverificationhasbeenaveryactiveresearchareasincethe1990s.Thispapersurveysvariousapproachesinthisarea,consideringtheverificationinthesymbolicmodel,aswellasthemorerecentapproachesthatrelyonthecomputationalmodelorthatver-ifyprotocolimplementationsratherthanspecifications.Additionally,webrieflydescribeoursymbolicsecurityprotocolverifierProVerifandsit-uateitamongtheseapproaches.1SecurityProtocolsSecurityprotocolsareprogramsthataimatsecuringcommunicationsonin-securenetworks,suchasInternet,byrelyingoncryptographicprimitives.Se-curityprotocolsareubiquitous:theyareused,forinstance,fore-commerce(e.g.,theprotocolTLS[109],usedforhttps://URLs),banktransactions,mobilephoneandWiFinetworks,RFIDtags,ande-voting.However,thede-signofsecurityprotocolsisparticularlyerror-prone.ThiscanbeillustratedforinstancebytheveryfamousNeedham-Schroederpublic-keyprotocol[160],inwhichaflawwasfoundbyLowe[147]17yearsafteritspublication.Eventhoughmuchprogresshasbeenmadesincethen,manyflawsarestillfoundincurrentsecurityprotocols(see,e.g.,http://www.openssl.org/news/andhttp://www.openssh.org/security.html).Securityerrorscanhaveseriousconsequences,resultinginlossofmoneyorlossofconfidenceofusersinthesys-tem.Moreover,securityerrorscannotbedetectedbyfunctionalsoftwaretestingbecausetheyappearonlyinthepresenceofamaliciousadversary.Automatictoolscanthereforebeveryhelpfulinordertoobtainactualguaranteesthatsecurityprotocolsarecorrect.Thisisareasonwhytheverificationofsecurityprotocolshasbeenaveryactiveresearchareasincethe1990s,andisstillveryactive.Thissurveyaimsatsummarizingtheresultsobtainedinthisarea.Duetothelargenumberofpapersonsecurityprotocolverificationandthelimitedspace,wehadtoomitmanyofthem;webelievethatwestillpresentrepre-sentativesofthemainapproaches.Additionally,Sect.2.2brieflydescribesoursymbolicverificationtoolProVerif.1.1AnExampleofProtocolWeillustratethenotionofsecurityprotocolwiththefollowingexample,asim-plifiedversionoftheDenning-Saccopublic-keykeydistributionprotocol[108].
2BrunoBlanchetMessage1.AB:{{k}skA}pkBkfreshMessage2.BA:{s}kAsusual,AB:MmeansthatAsendstoBthemessageM;{M}skdenotesthesignatureofMwiththesecretkeysk(whichcanbeverifiedwiththepublickeypk);{M}pkdenotesthepublic-keyencryptionofmessageMunderthepublickeypk(whichcanbedecryptedwiththecorrespondingsecretkeysk);{M}kdenotestheshared-keyencryptionofmessageMunderkeyk(whichcanbedecryptedwiththesamekeyk).Inthisprotocol,theprincipalAchoosesafreshkeykateachrunoftheprotocol.ShesignsthiskeywithhersigningkeyskA,encryptstheobtainedmessagewiththepublickeyofherinterlocutorB,andsendshimthemessage.WhenBreceivesit,hedecryptsit(withhissecretkeyskB),verifiesthesignatureofA,andobtainsthekeyk.Havingverifiedthissignature,BisconvincedthatthekeywaschosenbyA,andencryptionunderpkBguaranteesthatonlyBcoulddecryptthemessage,sokshouldbesharedbetweenAandB.Then,Bencryptsasecretsunderthesharedkeyk.OnlyAshouldbeabletodecryptthemessageandobtainthesecrets.Ingeneral,intheliterature,asintheexampleabove,theprotocolsarede-scribedinformallybygivingthelistofmessagesthatshouldbeexchangedbe-tweentheprincipals.Nevertheless,onemustbecarefulthatthesedescriptionsareonlyinformal:theyindicatewhathappensintheabsenceofanadversary.However,anadversarycancapturemessagesandsendhisownmessages,sothesourceandthetargetofamessagemaynotbetheexpectedone.Moreover,thesedescriptionsleaveimplicittheverificationsdonebytheprincipalswhentheyreceivemessages.Sincetheadversarymaysendmessagesdifferentfromtheexpectedones,andexploittheobtainedreply,theseverificationsareveryimportant:theydeterminewhichmessageswillbeacceptedorrejected,andmaythereforeprotectornotagainstattacks.Formalmodelsofprotocols,suchas[5,7,72,117]makeallthisprecise.Althoughtheexplanationabovemayseemtojustifyitssecurityinformally,thisprotocolissubjecttoanattack:Message1.AC:{{k}skA}pkCMessage1’.C(A)B:{{k}skA}pkBMessage2.BC(A):{s}kInthisattack,ArunstheprotocolwithadishonestprincipalC.Thisprincipalgetsthefirstmessageoftheprotocol{{k}skA}pkC,decryptsitandre-encryptsitunderthepublickeyofB.Theobtainedmessage{{k}skA}pkBcorrespondsexactlytothefirstmessageofasessionbetweenAandB.Then,CsendsthismessagetoBimpersonatingA;above,wedenotebyC(A)thedishonestpartic-ipantCimpersonatingA.Breplieswiththesecrets,intendedforA,encryptedunderk.C,havingobtainedthekeykbythefirstmessage,candecryptthismessageandobtainthesecrets.Theprotocolcaneasilybefixed,byaddingtheidentityofBtothesignedmessage,whichyieldsthefollowingprotocol:
  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents