Analysis of Real-World Security Protocols in a Universal Composability Framework

Analysis of Real-World Security Protocols in a Universal Composability Framework
Author :
Publisher : Logos Verlag Berlin GmbH
Total Pages : 342
Release :
ISBN-10 : 9783832534684
ISBN-13 : 3832534687
Rating : 4/5 (84 Downloads)

Book Synopsis Analysis of Real-World Security Protocols in a Universal Composability Framework by : Max Tuengerthal

Download or read book Analysis of Real-World Security Protocols in a Universal Composability Framework written by Max Tuengerthal and published by Logos Verlag Berlin GmbH. This book was released on 2013 with total page 342 pages. Available in PDF, EPUB and Kindle. Book excerpt: Security protocols employed in practice are used in our everyday life and we heavily depend on their security. The complexity of these protocols still poses a big challenge on their comprehensive analysis. To cope with this complexity, a promising approach is modular security analysis based on universal composability frameworks, such as Canetti's UC model. This appealing approach has, however, only very rarely been applied to the analysis of (existing) real-world protocols. Either the analysis was not fully modular or it could only be applied to idealized variants of the protocols. The main goal of this thesis therefore is to push modular protocol analysis as far as possible, but without giving up on accurate modeling. Our main contributions in a nutshell: An ideal functionality for symmetric key cryptography that provides a solid foundation for faithful, composable cryptographic analysis of real-world security protocols. A computational soundness result of formal analysis for key exchange protocols that use symmetric encryption. Novel universal and joint state composition theorems that are applicable to the analysis of real-world security protocols. Case studies on several security protocols: SSL/TLS, IEEE 802.11i (WPA2), SSH, IPsec, and EAP-PSK. We showed that our new composition theorems can be used for a faithful, modular analysis of these protocols. In addition, we proved composable security properties for two central protocols of the IEEE standard 802.11i, namely the 4-Way Handshake Protocol and the CCM Protocol. This constitutes the first rigorous cryptographic analysis of these protocols. While our applications focus on real-world security protocols, our theorems, models, and techniques should be useful beyond this domain.


Analysis of Real-World Security Protocols in a Universal Composability Framework Related Books

Analysis of Real-World Security Protocols in a Universal Composability Framework
Language: en
Pages: 342
Authors: Max Tuengerthal
Categories: Computers
Type: BOOK - Published: 2013 - Publisher: Logos Verlag Berlin GmbH

DOWNLOAD EBOOK

Security protocols employed in practice are used in our everyday life and we heavily depend on their security. The complexity of these protocols still poses a b
Topics in Cryptology -- CT-RSA 2011
Language: en
Pages: 427
Authors: Aggelos Kiayias
Categories: Computers
Type: BOOK - Published: 2011-01-25 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2011, CT-RSA 2011, held in San Francisco, CA, USA, in February
Information Theoretic Security
Language: en
Pages: 222
Authors: Adam Smith
Categories: Computers
Type: BOOK - Published: 2012-08-04 - Publisher: Springer

DOWNLOAD EBOOK

This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 201
GUIDE TO INTERNET CRYPTOGRAPHY
Language: en
Pages: 535
Authors: JOERG. SCHWENK
Categories:
Type: BOOK - Published: 2022 - Publisher: Springer Nature

DOWNLOAD EBOOK

Advances in Cryptology – EUROCRYPT 2018
Language: en
Pages: 639
Authors: Jesper Buus Nielsen
Categories: Computers
Type: BOOK - Published: 2018-04-16 - Publisher: Springer

DOWNLOAD EBOOK

The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Appl