Modelling ciphersuite and version negotiation in the TLS protocol
Contribuinte(s) |
Foo, Ernest Stebila, Douglas |
---|---|
Data(s) |
29/06/2015
|
Resumo |
Real-world cryptographic protocols such as the widely used Transport Layer Security (TLS) protocol support many different combinations of cryptographic algorithms (called ciphersuites) and simultaneously support different versions. Recent advances in provable security have shown that most modern TLS ciphersuites are secure authenticated and confidential channel establishment (ACCE) protocols, but these analyses generally focus on single ciphersuites in isolation. In this paper we extend the ACCE model to cover protocols with many different sub-protocols, capturing both multiple ciphersuites and multiple versions, and define a security notion for secure negotiation of the optimal sub-protocol. We give a generic theorem that shows how secure negotiation follows, with some additional conditions, from the authentication property of secure ACCE protocols. Using this framework, we analyse the security of ciphersuite and three variants of version negotiation in TLS, including a recently proposed mechanism for detecting fallback attacks. |
Formato |
application/pdf |
Identificador | |
Publicador |
Springer |
Relação |
http://eprints.qut.edu.au/86650/1/main_lncs.pdf DOI:10.1007/978-3-319-19962-7_16 Dowling, Benjamin & Stebila, Douglas (2015) Modelling ciphersuite and version negotiation in the TLS protocol. In Foo, Ernest & Stebila, Douglas (Eds.) Information Security and Privacy [Lecture Notes in Computer Science], Springer, QUT Gardens Point, Brisbane, Australia, pp. 270-288. http://purl.org/au-research/grants/ARC/DP130104304 |
Direitos |
Copyright 2015 Springer International Publishing Switzerland The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-19962-7_16 |
Fonte |
School of Electrical Engineering & Computer Science; Institute for Future Environments; Science & Engineering Faculty |
Palavras-Chave | #080303 Computer System Security #080402 Data Encryption #Transport Layer Security (TLS) #Ciphersuite negotiation #Version negotiation #Downgrade attacks #Cryptographic protocols |
Tipo |
Conference Paper |