Formal Computational Unlinkability Proofs of RFID Protocols Hubert - - PowerPoint PPT Presentation

formal computational unlinkability proofs of rfid
SMART_READER_LITE
LIVE PREVIEW

Formal Computational Unlinkability Proofs of RFID Protocols Hubert - - PowerPoint PPT Presentation

Formal Computational Unlinkability Proofs of RFID Protocols Hubert Comon, Adrien Koutsos January 29, 2018 Hubert Comon, Adrien Koutsos Formal Proofs of RFID Protocols January 29, 2018 1 / 21 Motivations Security protocols Distributed


slide-1
SLIDE 1

Formal Computational Unlinkability Proofs of RFID Protocols

Hubert Comon, Adrien Koutsos January 29, 2018

Hubert Comon, Adrien Koutsos Formal Proofs of RFID Protocols January 29, 2018 1 / 21

slide-2
SLIDE 2

Motivations

Security protocols

Distributed programs which aim at providing some security properties.

The KCL+ RFID protocol

R : nR

$

← TA : nT

$

← 1 : R − → TA : nR 2 : TA − → R : A ⊕ H(nT, kA) , nT ⊕ H(nR, kA)

Hubert Comon, Adrien Koutsos Formal Proofs of RFID Protocols January 29, 2018 2 / 21

slide-3
SLIDE 3

Security Properties

Security protocols are short: few lines of specification. Security properties are complex: the attacker controls the network. ⇒ Need to use formal methods.

The problem

Given a protocol P and a class of attackers C, show that: ∀A ∈ C (P | A) satisfies φsec

Hubert Comon, Adrien Koutsos Formal Proofs of RFID Protocols January 29, 2018 3 / 21

slide-4
SLIDE 4

Attacker Models

Models

Dolev Yao Computational Messages representation: Abstract terms Bitstrings Adversaries capabilities: Explicitly specified through a TRS Polynomial Time Probabilistic TMs

Advantages and drawbacks

Dolev Yao Computational Good proof automation Few proof automation Not a realistic model Strong security guarantees But with implicit hypothesis

Hubert Comon, Adrien Koutsos Formal Proofs of RFID Protocols January 29, 2018 4 / 21

slide-5
SLIDE 5

The Complete Symbolic Attacker Model

The Complete Symbolic Attacker Model [Bana,Comon 2012]

A first-order logic. Axioms specifying what the adversary cannot do. Security of a protocol expressed as a goal formula.

Advantages

All hypotheses appear explicitly in the axioms. Possible proof automation. Security implies computational security.

Two logics

Reachability properties: [Scerri 2016] We focus on the indistinguishability logic.

Hubert Comon, Adrien Koutsos Formal Proofs of RFID Protocols January 29, 2018 5 / 21

slide-6
SLIDE 6

1

Motivations

2

The Complete Symbolic Attacker Model Syntax Computational semantics

3

Axioms Structural Axioms Pseudo Random Function

4

Case Studies: Security of Two RFID Protocols

5

Conclusion

Hubert Comon, Adrien Koutsos Formal Proofs of RFID Protocols January 29, 2018 6 / 21

slide-7
SLIDE 7

Syntax

Term algebra

Control flow function symbols: if_then_else_, EQ(_; _), true, false Protocol function symbols: {_, _, π1(_), π2(_), H(_, _), _ ⊕ _} Adversarial function symbols G. A set of names N. A set of variables X.

Formulas

φ ::= u ∼ v | φ ∧ φ | ¬φ | ⊥ | ∀x.φ where u, v are sequences of terms

Hubert Comon, Adrien Koutsos Formal Proofs of RFID Protocols January 29, 2018 7 / 21

slide-8
SLIDE 8

Example

The KCL+ protocol

1 : R − → TA : nR 2 : TA − → R : A ⊕ H(nT, kA) , nT ⊕ H(nR, kA)

Example

Terms: mA = A ⊕ H(nT, kA) , nT ⊕ H(g(nR), kA) Formula: nR, mA ∼ nR, mB

Hubert Comon, Adrien Koutsos Formal Proofs of RFID Protocols January 29, 2018 8 / 21

slide-9
SLIDE 9

Computational Semantics of Terms

Computational model Mc : term interpretation

f/n ∈ Σ ∪ G interpreted as a polynomial time Turing Machine. n ∈ N interpreted as a random sampling {if_then_else_, EQ(_; _), true, false} interpretations are the expected ones.

Computational model Mc : predicate interpretation

∼ interpreted as computational indistinguishability.

Example

For every computational model Mc we have: Mc | = A ⊕ n1 ∼ B ⊕ n2

Hubert Comon, Adrien Koutsos Formal Proofs of RFID Protocols January 29, 2018 9 / 21

slide-10
SLIDE 10

Proof Technique

Goal

Ground formula u ∼ v expressing the security of the protocol. The formula is automatically obtained by folding the executions of the protocol [Bana,Comon 14].

Axioms A : what the adversary cannot do

Computationally valid structural axioms. Implementation and cryptographic axioms.

Soundness Theorem [Bana,Comon 14]

If A ∧ u ∼ v is unsatisfiable then the protocol is computationally secure. (under some cryptographic/implementation assumptions)

Hubert Comon, Adrien Koutsos Formal Proofs of RFID Protocols January 29, 2018 10 / 21

slide-11
SLIDE 11

1

Motivations

2

The Complete Symbolic Attacker Model Syntax Computational semantics

3

Axioms Structural Axioms Pseudo Random Function

4

Case Studies: Security of Two RFID Protocols

5

Conclusion

Hubert Comon, Adrien Koutsos Formal Proofs of RFID Protocols January 29, 2018 11 / 21

slide-12
SLIDE 12

Structural Axioms : Examples

Relation axioms

Refl x ∼ x x ∼ y Sym y ∼ x x ∼ y y ∼ z Trans x ∼ z

∼ is not a congruence!

Counter-Example: n ∼ n and n ∼ n′, but n, n ∼ n, n′.

Function Application

If you cannot distinguish the arguments, you cannot distinguish the images. x1, . . . , xn ∼ y1, . . . , yn FunApp f (x1, . . . , xn) ∼ f (y1, . . . , yn)

Hubert Comon, Adrien Koutsos Formal Proofs of RFID Protocols January 29, 2018 12 / 21

slide-13
SLIDE 13

Pseudo Random Function

Definition

H is a Pseudo Random Function if for every PPTM adversary A: |Pr(k : AOH(·,k)(1η) = 1) − Pr(g : AOg(·)(1η) = 1)| is negligible in η, where: k is drawn uniformly in {0, 1}η. g is drawn uniformly in the set of all functions from {0, 1}∗ to {0, 1}η.

Hubert Comon, Adrien Koutsos Formal Proofs of RFID Protocols January 29, 2018 13 / 21

slide-14
SLIDE 14

Translation in the Logic

Axiom for one hash

H(s, k) ∼ n Where k does not appear in s.

Bad axiom for two hashes

If s and t are syntactically distinct, H(s, k), H(t, k) ∼ H(s, k), n Counter-Example: s = g(A), t = g(B) and we interpret the attacker function g as a constant function.

Hubert Comon, Adrien Koutsos Formal Proofs of RFID Protocols January 29, 2018 14 / 21

slide-15
SLIDE 15

Translation in the Logic

The PRF2 Axioms

H(s, k), if EQ(t; s) then 0 else H(t, k) ∼ H(s, k), if EQ(t; s) then 0 else n where: H and k only occur in (s, t) as H(s, k). n does not occur in (s, t).

Theorem : Soundness

The (PRFn)n∈N axioms are valid in every computational model Mc such that the interpretation of H satisfies the PRF assumption.

Hubert Comon, Adrien Koutsos Formal Proofs of RFID Protocols January 29, 2018 15 / 21

slide-16
SLIDE 16

1

Motivations

2

The Complete Symbolic Attacker Model Syntax Computational semantics

3

Axioms Structural Axioms Pseudo Random Function

4

Case Studies: Security of Two RFID Protocols

5

Conclusion

Hubert Comon, Adrien Koutsos Formal Proofs of RFID Protocols January 29, 2018 16 / 21

slide-17
SLIDE 17

Security Property

KCL+ Protocol: Unlinkability for 2 rounds (A, A vs. A, B)

φsec

2

≡ nR, m1, n′

R, mA 2 ∼ nR, m1, n′ R, mB 2

where m1, mA

2 are the terms:

m1 =A ⊕ H(nT, kA) , nT ⊕ H(g(nR), kA) mX

2 =X ⊕ H(n′ T, kX) , n′ T ⊕ H(g′(nR, m1, n′ R), kX)

Unlinkability for n Rounds.

A formula φsec

n

expressing unlinkability for n rounds of a protocol can be automatically computed from the specification. If A ∧ ¬φsec

n

is unsatisfiable then the protocol satisfies Strong Privacy [Juels,Weis 2009] for n rounds.

Hubert Comon, Adrien Koutsos Formal Proofs of RFID Protocols January 29, 2018 17 / 21

slide-18
SLIDE 18

Case Studies

Theorem: Unlinkability of KCL+

Assuming PRF for the keyed hash function, the KCL+ protocol verifies Strong Privacy for two agents and any number of rounds.

Theorem: Unlinkability of LAK+

Assuming PRF for the keyed hash function, the LAK+ protocol verifies Strong Privacy for two agents and two rounds.

Hubert Comon, Adrien Koutsos Formal Proofs of RFID Protocols January 29, 2018 18 / 21

slide-19
SLIDE 19

1

Motivations

2

The Complete Symbolic Attacker Model Syntax Computational semantics

3

Axioms Structural Axioms Pseudo Random Function

4

Case Studies: Security of Two RFID Protocols

5

Conclusion

Hubert Comon, Adrien Koutsos Formal Proofs of RFID Protocols January 29, 2018 19 / 21

slide-20
SLIDE 20

Conclusion

Contributions

Designed and proved axioms for PRF, CR, XOR and PRNG. Formally expressed Strong Privacy [Juels,Weis 2009] in our model. Proved Strong Privacy of KCL+ for an arbitrary number of rounds. Proved Strong Privacy LAK+ protocol for two rounds. Showed attacks against KCL+ and LAK+ for weaker assumptions.

Future Work

More examples, with more primitives (RFID or not). Automation through decidability of (a fragment of) the logic. Interactive/automatic prover.

Hubert Comon, Adrien Koutsos Formal Proofs of RFID Protocols January 29, 2018 20 / 21

slide-21
SLIDE 21

Thanks for your attention

Hubert Comon, Adrien Koutsos Formal Proofs of RFID Protocols January 29, 2018 21 / 21