Computationally sound automated proofs of cryptographic schemes
Data(s) |
2012
|
---|---|
Resumo |
Proving security of cryptographic schemes, which normally are short algorithms, has been known to be time-consuming and easy to get wrong. Using computers to analyse their security can help to solve the problem. This thesis focuses on methods of using computers to verify security of such schemes in cryptographic models. The contributions of this thesis to automated security proofs of cryptographic schemes can be divided into two groups: indirect and direct techniques. Regarding indirect ones, we propose a technique to verify the security of public-key-based key exchange protocols. Security of such protocols has been able to be proved automatically using an existing tool, but in a noncryptographic model. We show that under some conditions, security in that non-cryptographic model implies security in a common cryptographic one, the Bellare-Rogaway model [11]. The implication enables one to use that existing tool, which was designed to work with a different type of model, in order to achieve security proofs of public-key-based key exchange protocols in a cryptographic model. For direct techniques, we have two contributions. The first is a tool to verify Diffie-Hellmanbased key exchange protocols. In that work, we design a simple programming language for specifying Diffie-Hellman-based key exchange algorithms. The language has a semantics based on a cryptographic model, the Bellare-Rogaway model [11]. From the semantics, we build a Hoare-style logic which allows us to reason about the security of a key exchange algorithm, specified as a pair of initiator and responder programs. The other contribution to the direct technique line is on automated proofs for computational indistinguishability. Unlike the two other contributions, this one does not treat a fixed class of protocols. We construct a generic formalism which allows one to model the security problem of a variety of classes of cryptographic schemes as the indistinguishability between two pieces of information. We also design and implement an algorithm for solving indistinguishability problems. Compared to the two other works, this one covers significantly more types of schemes, but consequently, it can verify only weaker forms of security. |
Formato |
application/pdf |
Identificador | |
Publicador |
Queensland University of Technology |
Relação |
http://eprints.qut.edu.au/54668/1/Long_Ngo__Thesis.pdf Ngo, Long (2012) Computationally sound automated proofs of cryptographic schemes. PhD thesis, Queensland University of Technology. |
Fonte |
Science & Engineering Faculty |
Palavras-Chave | #computational soundness, automated proof, Diffie-Hellman, key exchange, encryption, random, oracle model, Bellare-Rogaway model, Dolev-Yao, symbolic, bridging, Hoare logic, modular, proof, universal algebra, passive security, IND-CPA security. |
Tipo |
Thesis |