verification techniques for cryptographic protocols
play

Verification techniques for cryptographic protocols eronique Cortier - PowerPoint PPT Presentation

Introduction Formal models Adding equational theories Towards more guarantees Verification techniques for cryptographic protocols eronique Cortier 1 V RTA08 1 LORIA, CNRS - INRIA Cassis project, Nancy Universities 1/45 V eronique


  1. Introduction Formal models Adding equational theories Towards more guarantees Verification techniques for cryptographic protocols eronique Cortier 1 V´ RTA’08 1 LORIA, CNRS - INRIA Cassis project, Nancy Universities 1/45 V´ eronique Cortier Verification techniques for cryptographic protocols

  2. Introduction Formal models Context Adding equational theories A famous attack Towards more guarantees Context : cryptographic protocols Widely used : web (SSH, SSL, ...), pay-per-view, electronic purse, mobile phone, ... Should ensure : confidentiality, authenticity, integrity, anonymity, ... 2/45 V´ eronique Cortier Verification techniques for cryptographic protocols

  3. Introduction Formal models Context Adding equational theories A famous attack Towards more guarantees Context : cryptographic protocols Widely used : web (SSH, SSL, ...), pay-per-view, electronic purse, mobile phone, ... Should ensure : confidentiality, authenticity, integrity, anonymity, ... Presence of an attacker may read every message sent on the net, may intercept and send new messages. 2/45 V´ eronique Cortier Verification techniques for cryptographic protocols

  4. Introduction Formal models Context Adding equational theories A famous attack Towards more guarantees Example : Credit Card Payment Protocol The waiter introduces the credit card. The waiter enters the amount m of the transaction on the terminal. The terminal authenticates the card. The customer enters his secret code. If the amount m is greater than 100 euros (and in only 20% of the cases) The terminal asks the bank for authentication of the card. The bank provides authentication. 3/45 V´ eronique Cortier Verification techniques for cryptographic protocols

  5. Introduction Formal models Context Adding equational theories A famous attack Towards more guarantees More details 4 actors : Bank, Customer, Card and Terminal. Bank owns a signing key K − 1 B , secret, a verification key K B , public, a secret symmetric key for each credit card K CB , secret. Card owns Data : last name, first name, card’s number, expiration date, Signature’s Value VS = { hash (Data) } K − 1 B , secret key K CB . Terminal owns the verification key K B for bank’s signatures. 4/45 V´ eronique Cortier Verification techniques for cryptographic protocols

  6. Introduction Formal models Context Adding equational theories A famous attack Towards more guarantees Credit card payment Protocol (in short) The terminal reads the card : 1 . → T : Data , { hash (Data) } K − 1 Ca B 5/45 V´ eronique Cortier Verification techniques for cryptographic protocols

  7. Introduction Formal models Context Adding equational theories A famous attack Towards more guarantees Credit card payment Protocol (in short) The terminal reads the card : 1 . → T : Data , { hash (Data) } K − 1 Ca B The terminal asks for the secret code : 2 . → Cu : secret code ? T 3 . Cu → Ca : 1234 4 . → T : ok Ca 5/45 V´ eronique Cortier Verification techniques for cryptographic protocols

  8. Introduction Formal models Context Adding equational theories A famous attack Towards more guarantees Credit card payment Protocol (in short) The terminal reads the card : 1 . → T : Data , { hash (Data) } K − 1 Ca B The terminal asks for the secret code : 2 . → Cu : secret code ? T 3 . Cu → Ca : 1234 4 . → T : ok Ca The terminal calls the bank : 5 . T → B : auth ? 6 . → T : N b B 7 . T → Ca : N b 8 . → T : { N b } K CB Ca 9 . T → B : { N b } K CB → 10 . B T : ok 5/45 V´ eronique Cortier Verification techniques for cryptographic protocols

  9. Introduction Formal models Context Adding equational theories A famous attack Towards more guarantees Some flaws The security was initially ensured by : the cards were very difficult to reproduce, the protocol and the keys were secret. But cryptographic flaw : 320 bits keys can be broken (1988), logical flaw : no link between the secret code and the authentication of the card, fake cards can be build. 6/45 V´ eronique Cortier Verification techniques for cryptographic protocols

  10. Introduction Formal models Context Adding equational theories A famous attack Towards more guarantees Some flaws The security was initially ensured by : the cards were very difficult to reproduce, the protocol and the keys were secret. But cryptographic flaw : 320 bits keys can be broken (1988), logical flaw : no link between the secret code and the authentication of the card, fake cards can be build. → “YesCard” build by Serge Humpich (1998). 6/45 V´ eronique Cortier Verification techniques for cryptographic protocols

  11. Introduction Formal models Context Adding equational theories A famous attack Towards more guarantees How does the “YesCard” work ? Logical flaw 1 . → T : Data , { hash (Data) } K − 1 Ca B 2 . → Ca : secret code ? T 3 . Cu → Ca : 1234 4 . → T : ok Ca 7/45 V´ eronique Cortier Verification techniques for cryptographic protocols

  12. Introduction Formal models Context Adding equational theories A famous attack Towards more guarantees How does the “YesCard” work ? Logical flaw 1 . → T : Data , { hash (Data) } K − 1 Ca B 2 . → Ca : secret code ? T 3 . Cu → Ca ′ : 2345 4 . Ca ′ → T : ok 7/45 V´ eronique Cortier Verification techniques for cryptographic protocols

  13. Introduction Formal models Context Adding equational theories A famous attack Towards more guarantees How does the “YesCard” work ? Logical flaw 1 . → T : Data , { hash (Data) } K − 1 Ca B 2 . → Ca : secret code ? T 3 . Cu → Ca ′ : 2345 4 . Ca ′ → T : ok Remark : there is always somebody to debit. → creation of a fake card (Serge Humpich). 7/45 V´ eronique Cortier Verification techniques for cryptographic protocols

  14. Introduction Formal models Context Adding equational theories A famous attack Towards more guarantees How does the “YesCard” work ? Logical flaw 1 . → T : Data , { hash (Data) } K − 1 Ca B 2 . → Ca : secret code ? T 3 . Cu → Ca ′ : 2345 4 . Ca ′ → T : ok Remark : there is always somebody to debit. → creation of a fake card (Serge Humpich). Ca ′ → T : XXX , { hash (XXX) } K − 1 1 . B → Cu 2 . T : secret code ? 3 . → Ca ′ : 0000 Cu Ca ′ → T 4 . : ok 7/45 V´ eronique Cortier Verification techniques for cryptographic protocols

  15. Introduction Formal models Context Adding equational theories A famous attack Towards more guarantees Outline of the talk 1 Introduction Context A famous attack 2 Formal models Intruder Protocol Solving constraint systems A survey of results 3 Adding equational theories Motivation Intruder problem Some results 4 Towards more guarantees Cryptographic models Linking Formal and cryptographic models Conclusion 8/45 V´ eronique Cortier Verification techniques for cryptographic protocols

  16. Introduction Intruder Formal models Protocol Adding equational theories Solving constraint systems Towards more guarantees A survey of results Motivation : Cryptography does not suffice to ensure security ! Example : Commutative encryption (RSA) { pin : 3443 } k alice − − − − − − − − − − − → 9/45 V´ eronique Cortier Verification techniques for cryptographic protocols

  17. Introduction Intruder Formal models Protocol Adding equational theories Solving constraint systems Towards more guarantees A survey of results Motivation : Cryptography does not suffice to ensure security ! Example : Commutative encryption (RSA) { pin : 3443 } k alice − − − − − − − − − − − →  ff { pin : 3443 } k alice k bob ← − − − − − − − − − − − − − − − 9/45 V´ eronique Cortier Verification techniques for cryptographic protocols

  18. Introduction Intruder Formal models Protocol Adding equational theories Solving constraint systems Towards more guarantees A survey of results Motivation : Cryptography does not suffice to ensure security ! Example : Commutative encryption (RSA) { pin : 3443 } k alice − − − − − − − − − − − →  ff { pin : 3443 } k alice k bob ← − − − − − − − − − − − − − − − { pin : 3443 } k bob − − − − − − − − − − − → � � � � { pin : 3443 } k alice { pin : 3443 } k bob Since = k bob k alice 9/45 V´ eronique Cortier Verification techniques for cryptographic protocols

  19. Introduction Intruder Formal models Protocol Adding equational theories Solving constraint systems Towards more guarantees A survey of results Motivation : Cryptography does not suffice to ensure security ! Example : Commutative encryption (RSA) { pin : 3443 } k alice − − − − − − − − − − − →  ff { pin : 3443 } k alice k bob ← − − − − − − − − − − − − − − − { pin : 3443 } k bob − − − − − − − − − − − → → It does not work ! (Authentication problem) 9/45 V´ eronique Cortier Verification techniques for cryptographic protocols

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend