[Resource Topic] 2006/171: Key confirmation and adaptive corruptions in the protocol security logic

Welcome to the resource topic for 2006/171

Title:
Key confirmation and adaptive corruptions in the protocol security logic

Authors: Prateek Gupta, Vitaly Shmatikov

Abstract:

Cryptographic security for key exchange and secure session establishment protocols is often defined in the so called ``adaptive corruptions’’ model. Even if the adversary corrupts one of the participants in the middle of the protocol execution and obtains the victim’s secrets such as the private signing key, the victim must be able to detect this and abort the protocol. This is usually achieved by adding a key confirmation message to the protocol. Conventional symbolic methods for protocol analysis assume unforgeability of digital signatures, and thus cannot be used to reason about security in the adaptive corruptions model. We present a symbolic protocol logic for reasoning about authentication and key confirmation in key exchange protocols. The logic is cryptographically sound: a symbolic proof of authentication and secrecy implies that the protocol is secure in the adaptive corruptions model. We illustrate our method by formally proving security of an authenticated Diffie-Hellman protocol with key confirmation.

ePrint: https://eprint.iacr.org/2006/171

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .