security of tls 1 2
play

Security of TLS 1.2 The ACCE model TLS Crypto Seminar February 7, - PowerPoint PPT Presentation

Security of TLS 1.2 The ACCE model TLS Crypto Seminar February 7, 2019 Joseph Jaeger UC San Diego some slides & formatting stolen from Felix Gnther February 7, 2019 | Security of TLS | TLS Crypto Seminar, Winter 2019 Quarter, UC


  1. Security of TLS ≤1.2 The ACCE model TLS Crypto Seminar February 7, 2019 Joseph Jaeger UC San Diego some slides & formatting stolen from Felix Günther February 7, 2019 | Security of TLS | TLS Crypto Seminar, Winter 2019 Quarter, UC Joseph Jaeger 1 San Diego

  2. Today's Plan Goal ● What is the ACCE security model? Why was it needed for studying TLS? ● Dig into the details of the formalism. Part I Background ● Stateful Length-Hiding Authenticated Encryption ● Authenticated Key Exchange Part II ACCE Security Model ● Authenticated and Confidential Channel Establishment ● TLS 1.2 Security Results (Time Permitting) February 7, 2019 | Security of TLS | TLS Crypto Seminar, Winter 2019 Quarter, UC Joseph Jaeger 2 San Diego

  3. Background February 7, 2019 | Security of TLS | TLS Crypto Seminar, Winter 2019 Quarter, UC Joseph Jaeger 3 San Diego

  4. TLS Components From the first lecture: Security Typically Desired: ● Handshake Protocol = Authenticated Key Exchange ● Record Protocol = Stateful Length Hiding Authenticated Encryption February 7, 2019 | Security of TLS | TLS Crypto Seminar, Winter 2019 Quarter, UC Joseph Jaeger 4 San Diego

  5. Formalisms Formalisms based on: February 7, 2019 | Security of TLS | TLS Crypto Seminar, Winter 2019 Quarter, UC Joseph Jaeger 5 San Diego

  6. sLHAE Definition Syntax February 7, 2019 | Security of TLS | TLS Crypto Seminar, Winter 2019 Quarter, UC Joseph Jaeger 6 San Diego

  7. sLHAE Definition Security Security Typically Desired: ● All-in-one definition requiring left-right IND-CPA and INT-CTXT style security February 7, 2019 | Security of TLS | TLS Crypto Seminar, Winter 2019 Quarter, UC Joseph Jaeger 7 San Diego

  8. Key Exchange Definition Previously February 7, 2019 | Security of TLS | TLS Crypto Seminar, Winter 2019 Quarter, UC Joseph Jaeger 8 San Diego

  9. TLS Example February 7, 2019 | Security of TLS | TLS Crypto Seminar, Winter 2019 Quarter, UC Joseph Jaeger 9 San Diego

  10. ACCE February 7, 2019 | Security of TLS | TLS Crypto Seminar, Winter 2019 Quarter, UC Joseph Jaeger 10 San Diego

  11. ACCE Main Idea: Squish encryption and key exchange security together into single notion. February 7, 2019 | Security of TLS | TLS Crypto Seminar, Winter 2019 Quarter, UC Joseph Jaeger 11 San Diego

  12. Results Main Result: TLS-DHE is secure in this model February 7, 2019 | Security of TLS | TLS Crypto Seminar, Winter 2019 Quarter, UC Joseph Jaeger 12 San Diego

  13. Results Model: Closely related to discussed ACCE model. No client authentication. No forward security. Main Result: TLS-RSA is secure in this model. (Under OW-PCA assumption.) TLS-DH is secure in this model. (Under PRF-ODH assumption.) TLS would be secure in this model with CCA secure encryption February 7, 2019 | Security of TLS | TLS Crypto Seminar, Winter 2019 Quarter, UC Joseph Jaeger 13 San Diego

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend