Enrich-by-need Protocol Analysis for Diffie-Hellman (Extended Version)

04/16/2018
by   Moses D. Liskov, et al.
0

Enrich-by-need protocol analysis is a style of symbolic protocol analysis that characterizes all executions of a protocol that extend a given scenario. In effect, it computes a strongest security goal the protocol achieves in that scenario. CPSA, a Cryptographic Protocol Shapes Analyzer, implements enrich-by-need protocol analysis. In this paper, we describe how to analyze protocols using the Diffie-Hellman mechanism for key agreement (DH) in the enrich-by-need style. DH, while widespread, has been challenging for protocol analysis because of its algebraic structure. DH essentially involves fields and cyclic groups, which do not fit the standard foundational framework of symbolic protocol analysis. By contrast, we justify our analysis via an algebraically natural model. This foundation makes the extended CPSA implementation reliable. Moreover, it provides informative and efficient results. An appendix explains how unification is efficiently done in our framework.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/16/2020

Finite Key Analysis of the Extended B92 Protocol

In this paper we derive a key rate expression for the extended version o...
research
01/11/2018

Secrecy by Witness-Functions on Increasing Protocols

In this paper, we present a new formal method to analyze cryptographic p...
research
07/20/2022

PFMC: a parallel symbolic model checker for security protocol verification

We present an investigation into the design and implementation of a para...
research
01/05/2018

Secrecy by Witness-Functions under Equational Theories

In this paper, we use the witness-functions to analyze cryptographic pro...
research
07/12/2023

An Efficient Canonical Narrowing Implementation with Irreducibility and SMT Constraints for Generic Symbolic Protocol Analysis

Narrowing and unification are very useful tools for symbolic analysis of...
research
04/19/2018

Homomorphisms and Minimality for Enrich-by-Need Security Analysis

Cryptographic protocols are used in different environments, but existing...
research
10/26/2020

Protocol Analysis with Time

We present a framework suited to the analysis of cryptographic protocols...

Please sign up or login with your details

Forgot password? Click here to reset