An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols
Iliano Cervesato
Tulane University
CSFW 2005 June 20, 2005
An Encapsulated Authentication Logic for Reasoning about Key - - PowerPoint PPT Presentation
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols Catherine Meadows Dusko Pavlovic NRL Kestrel Institute Iliano Cervesato Tulane University CSFW 2005 June 20, 2005 Contributions Separate
CSFW 2005 June 20, 2005
I.Cervesato: Encapsulated Authentication Logic 1/28
I.Cervesato: Encapsulated Authentication Logic 2/28
I.Cervesato: Encapsulated Authentication Logic 3/28
Generate k Send k to B Send k to A
I.Cervesato: Encapsulated Authentication Logic 4/28
I.Cervesato: Encapsulated Authentication Logic 5/28
– Proof obligation in secrecy logic
– Proof obligation in auth. logic
I.Cervesato: Encapsulated Authentication Logic 6/28
I.Cervesato: Encapsulated Authentication Logic 7/28
A: ObsA Φ A: Ψ & ObsA Φ
I.Cervesato: Encapsulated Authentication Logic 8/28
k m
secret(k,[A,S])
I.Cervesato: Encapsulated Authentication Logic 9/28
X
t
Honest B
tA tA + ∆ tA
time
m
A
A B
t
I.Cervesato: Encapsulated Authentication Logic 10/28
A
n K n n
B
secret(K, [A,B])
I.Cervesato: Encapsulated Authentication Logic 11/28
A
KAS k
S B
KBS k ν k
secret(KAS, [A,S])
A
KAS k
S B
KBS k
honest S
ν k
?
secret(KAS, [A,S]) & honest S & A: (KAS k)A < (KAS k)A KAS kS< KBS kS< (ν k)S <
secret(KAS, [A,S])
A
KAS k
S secret(KAS, [A,S]) & A: (KAS k)A < (KAS k)A KAS kS< A
KAS k
X A: (KAS k)A < (KAS k)A KAS kX< A: (KAS k)A (KAS k)A A
KAS k
I.Cervesato: Encapsulated Authentication Logic 12/28
I.Cervesato: Encapsulated Authentication Logic 13/28
A
KAS k
S B
KBS k ν k A,B
Parameter discharge
I.Cervesato: Encapsulated Authentication Logic 14/28
Name binding A
KAS (B,k)
S B
KBS (A,k) ν k A,B
I.Cervesato: Encapsulated Authentication Logic 15/28
Relay A
KAS(B,k), KBS(A,k)
S B
ν k A,B KBS(A,k)
I.Cervesato: Encapsulated Authentication Logic 16/28
Auth. injection
A
KAS(B,k,KBS(A,k))
S B
ν k A,B KBS(A,k)
Relay
I.Cervesato: Encapsulated Authentication Logic 17/28
A
KAS(B,k,KBS(A,k))
S B
ν k A,B KBS(A,k)
secret(KBS, [B,S])
S B
honest S
ν k A,B
A
KAS (B,k, KBS (A,k)) KBS (A,k)
secret(KAS, [A,S]) secret(KBS, [B,S])
S
honest S
ν k A,B
A
KAS (B,k, KBS (A,k))
B
KBS (A,k)
?
B
KBS (A,k)
I.Cervesato: Encapsulated Authentication Logic 18/28
I.Cervesato: Encapsulated Authentication Logic 19/28
A
n KAS n ν n
S S B
ν k A,B
A
KAS (B,k, KBS (A,k)) KBS (A,k) ν k A,B,n KAS (n,B,k, KBS (A,k)) KBS (A,k) ν n
I.Cervesato: Encapsulated Authentication Logic 20/28
Nonce-based CR A
KAS(n,B,k,KBS(A,k))
S B
ν k n,A,B KBS(A,k) ν n
I.Cervesato: Encapsulated Authentication Logic 21/28
Nonce-based CR A
KAS(n,B,k,KBS(A,k,n’))
S B
ν k n,A,B, KBS(A,n’) KBS(A,k,n’) ν n KBS(A,n’) A ν n’
I.Cervesato: Encapsulated Authentication Logic 22/28
A
KAS(n,B,k,KBS(A,k))
S B
ν k n,A,B KBS(A,k) ν n k m
Post- composition
I.Cervesato: Encapsulated Authentication Logic 23/28
A
KAS(n,B,k,KBS(A,k))
S B
ν k n,A,B KBS(A,k) ν n k n’ k (n’+1) ν n’
I.Cervesato: Encapsulated Authentication Logic 24/28
A
KAS m
S
τ t KAS (m,t)
A S
KAS m
secret(KAS, [A,S])
A S
KAS (m,t)
secret(KAS, [A,S])
t
Honest B
tA tA + ∆ tA
time
I.Cervesato: Encapsulated Authentication Logic 25/28
Timestamping A
KAS(B,k,t,KBS(A,k,t))
S B
ν k τ t A,B KBS(A,k,t)
I.Cervesato: Encapsulated Authentication Logic 26/28
Key confirmation A
KAS(B,k,t,KBS(A,k,t))
S B
ν k τ t A,B KBS(A,k,t), k(A,t’) τ t’ k m[t’]
Repeated auth.
I.Cervesato: Encapsulated Authentication Logic 27/28
Key confirmation Repeated auth. A
KAS(B,k,t)
KBS(A,k,t)
S B
ν k τ t A,B KBS(A,k,t), k(A,t’) τ t’ k m[t’]
I.Cervesato: Encapsulated Authentication Logic 28/28