Verification of security protocols: from confidentiality to privacy
Stéphanie Delaune
LSV, CNRS & ENS Cachan, France
Tuesday, August 25th, 2015
- S. Delaune (LSV)
Verification of security protocols 25th August 2015 1 / 60
Verification of security protocols: from confidentiality to privacy - - PowerPoint PPT Presentation
Verification of security protocols: from confidentiality to privacy Stphanie Delaune LSV, CNRS & ENS Cachan, France Tuesday, August 25th, 2015 S. Delaune (LSV) Verification of security protocols 25th August 2015 1 / 60 ENS Cachan 12
Verification of security protocols 25th August 2015 1 / 60
Verification of security protocols 25th August 2015 2 / 60
Verification of security protocols 25th August 2015 3 / 60
Verification of security protocols 25th August 2015 4 / 60
Verification of security protocols 25th August 2015 5 / 60
Verification of security protocols 25th August 2015 6 / 60
Verification of security protocols 25th August 2015 7 / 60
Verification of security protocols 25th August 2015 7 / 60
Verification of security protocols 25th August 2015 7 / 60
encryption decryption
Verification of security protocols 25th August 2015 8 / 60
encryption decryption
Verification of security protocols 25th August 2015 8 / 60
Verification of security protocols 25th August 2015 9 / 60
Verification of security protocols 25th August 2015 10 / 60
encryption decryption public key private key
Verification of security protocols 25th August 2015 11 / 60
encryption decryption public key private key
Verification of security protocols 25th August 2015 11 / 60
signature verification private key public key
Verification of security protocols 25th August 2015 12 / 60
Verification of security protocols 25th August 2015 13 / 60
Verification of security protocols 25th August 2015 13 / 60
Verification of security protocols 25th August 2015 13 / 60
Verification of security protocols 25th August 2015 14 / 60
Verification of security protocols 25th August 2015 14 / 60
Verification of security protocols 25th August 2015 15 / 60
Verification of security protocols 25th August 2015 16 / 60
Verification of security protocols 25th August 2015 16 / 60
Verification of security protocols 25th August 2015 16 / 60
1 a logical flaw that allows a man in the middle attacker to downgrade
2 breaking encryption via factorisation of such a key can be easily done.
Verification of security protocols 25th August 2015 17 / 60
Verification of security protocols 25th August 2015 18 / 60
1 Modelling cryptographic protocols and their security properties 2 Designing verification algorithms
Verification of security protocols 25th August 2015 18 / 60
Verification of security protocols 25th August 2015 19 / 60
Verification of security protocols 25th August 2015 20 / 60
Verification of security protocols 25th August 2015 20 / 60
Verification of security protocols 25th August 2015 20 / 60
Verification of security protocols 25th August 2015 20 / 60
Verification of security protocols 25th August 2015 21 / 60
Verification of security protocols 25th August 2015 21 / 60
Verification of security protocols 25th August 2015 22 / 60
1 aenc(sign(k, sk(a)), b); 2 senc(s, k)
Verification of security protocols 25th August 2015 22 / 60
Verification of security protocols 25th August 2015 23 / 60
1 each leaf is labeled by v with v ∈ T; 2 for each node labeled by v0 and having n sons labeled by v1, . . . , vn,
3 the root is labeled by u.
Verification of security protocols 25th August 2015 24 / 60
1 each leaf is labeled by v with v ∈ T; 2 for each node labeled by v0 and having n sons labeled by v1, . . . , vn,
3 the root is labeled by u.
Verification of security protocols 25th August 2015 24 / 60
Verification of security protocols 25th August 2015 25 / 60
Verification of security protocols 25th August 2015 25 / 60
Verification of security protocols 25th August 2015 26 / 60
Verification of security protocols 25th August 2015 26 / 60
Verification of security protocols 25th August 2015 27 / 60
Verification of security protocols 25th August 2015 27 / 60
1 Saturation of T with terms in St(T ∪ {u}) that are deducible in one
2 if u is in the saturated set then return Yes else return No.
Verification of security protocols 25th August 2015 27 / 60
Verification of security protocols 25th August 2015 28 / 60
Verification of security protocols 25th August 2015 28 / 60
Verification of security protocols 25th August 2015 28 / 60
Verification of security protocols 25th August 2015 29 / 60
1 composition rules: encryption, signature, and pairing 2 decomposition rules: decryption, projections, . . .
Verification of security protocols 25th August 2015 29 / 60
1 Give an example showing that these deduction rules are not local. 2 Extend the notion of subterms to restore the locality property, and
Verification of security protocols 25th August 2015 30 / 60
1 Give an example showing that these deduction rules are not local. 2 Extend the notion of subterms to restore the locality property, and
1 Let T = {sign(s, sk(a)); a} and u = s. 2 St+(T) = St(T) ∪ {vk(u) | sk(u) ∈ vk(u) ∈ St(T)}.
Verification of security protocols 25th August 2015 30 / 60
1 Starting from T, apply as much as possible the decryption and the
2 Check whether u can be obtained by applying the composition rules
3 In case of success, the algorithm returns Yes. Otherwise, it returns No.
Verification of security protocols 25th August 2015 31 / 60
Verification of security protocols 25th August 2015 32 / 60
Verification of security protocols 25th August 2015 33 / 60
Verification of security protocols 25th August 2015 33 / 60
Verification of security protocols 25th August 2015 33 / 60
Verification of security protocols 25th August 2015 34 / 60
1 symmetric encryption: senc(·, ·), sdec(·, ·)
Verification of security protocols 25th August 2015 34 / 60
1 symmetric encryption: senc(·, ·), sdec(·, ·)
2 asymmetric encryption: aenc(·, ·), adec(·, ·), pk(·)
Verification of security protocols 25th August 2015 34 / 60
1 symmetric encryption: senc(·, ·), sdec(·, ·)
2 asymmetric encryption: aenc(·, ·), adec(·, ·), pk(·)
3 signature: sign(·, ·), check(·, ·)
Verification of security protocols 25th August 2015 34 / 60
Verification of security protocols 25th August 2015 35 / 60
Verification of security protocols 25th August 2015 35 / 60
Verification of security protocols 25th August 2015 36 / 60
Verification of security protocols 25th August 2015 36 / 60
Verification of security protocols 25th August 2015 36 / 60
Verification of security protocols 25th August 2015 36 / 60
Verification of security protocols 25th August 2015 36 / 60
1 saturation of φ with its deducible subterm; we get φ+ 2 does there exist a recipe R such that Rφ+ = s (syntaxic equality)
Verification of security protocols 25th August 2015 37 / 60
1 saturation of φ with its deducible subterm; we get φ+ 2 does there exist a recipe R such that Rφ+ = s (syntaxic equality)
Verification of security protocols 25th August 2015 37 / 60
1 saturation of φ with its deducible subterm; we get φ+ 2 does there exist a recipe R such that Rφ+ = s (syntaxic equality)
Verification of security protocols 25th August 2015 37 / 60
1 saturation of φ with its deducible subterm; we get φ+ 2 does there exist a recipe R such that Rφ+ = s (syntaxic equality)
Verification of security protocols 25th August 2015 37 / 60
Verification of security protocols 25th August 2015 38 / 60
Verification of security protocols 25th August 2015 38 / 60
Verification of security protocols 25th August 2015 39 / 60
Verification of security protocols 25th August 2015 40 / 60
Verification of security protocols 25th August 2015 40 / 60
Verification of security protocols 25th August 2015 41 / 60
Verification of security protocols 25th August 2015 41 / 60
Verification of security protocols 25th August 2015 41 / 60
Verification of security protocols 25th August 2015 41 / 60
Verification of security protocols 25th August 2015 41 / 60
Verification of security protocols 25th August 2015 42 / 60
1 saturation of φ/ψ with their deducible subterms φ+/ψ+ 2 does there exist a test R1
Verification of security protocols 25th August 2015 42 / 60
Verification of security protocols 25th August 2015 43 / 60
Verification of security protocols 25th August 2015 43 / 60
Verification of security protocols 25th August 2015 43 / 60
Verification of security protocols 25th August 2015 43 / 60
Verification of security protocols 25th August 2015 43 / 60
Verification of security protocols 25th August 2015 43 / 60
Verification of security protocols 25th August 2015 44 / 60
Verification of security protocols 25th August 2015 44 / 60
Verification of security protocols 25th August 2015 45 / 60
Verification of security protocols 25th August 2015 46 / 60
Verification of security protocols 25th August 2015 47 / 60
Verification of security protocols 25th August 2015 47 / 60
Verification of security protocols 25th August 2015 48 / 60
Verification of security protocols 25th August 2015 48 / 60
Verification of security protocols 25th August 2015 49 / 60
Verification of security protocols 25th August 2015 49 / 60
Verification of security protocols 25th August 2015 49 / 60
Verification of security protocols 25th August 2015 49 / 60
Verification of security protocols 25th August 2015 49 / 60
Verification of security protocols 25th August 2015 49 / 60
Verification of security protocols 25th August 2015 49 / 60
Verification of security protocols 25th August 2015 50 / 60
Verification of security protocols 25th August 2015 50 / 60
Verification of security protocols 25th August 2015 51 / 60
Verification of security protocols 25th August 2015 51 / 60
Verification of security protocols 25th August 2015 52 / 60
More details
More details
Verification of security protocols 25th August 2015 53 / 60
Verification of security protocols 25th August 2015 54 / 60
Verification of security protocols 25th August 2015 55 / 60
Verification of security protocols 25th August 2015 56 / 60
Verification of security protocols 25th August 2015 57 / 60
Verification of security protocols 25th August 2015 57 / 60
Verification of security protocols 25th August 2015 57 / 60
Verification of security protocols 25th August 2015 58 / 60
Verification of security protocols 25th August 2015 58 / 60
Verification of security protocols 25th August 2015 58 / 60
Verification of security protocols 25th August 2015 58 / 60
Back
Verification of security protocols 25th August 2015 58 / 60
Verification of security protocols 25th August 2015 59 / 60
Verification of security protocols 25th August 2015 59 / 60
Back
Verification of security protocols 25th August 2015 60 / 60