On Searching for Known and Chosen Cipher Pairs Using the NRL Protocol Analyzer

نویسندگان

  • Stuart G. Stubblebine
  • Catherine A. Meadows
چکیده

Formal methods have been successfully applied to exceedingly abstract system speciications to verify high level security properties such as authentication, key exchange, and fail-safe revocation. Furthermore, considerable research exists on evaluating particular ciphers and secure hash functions used to implement high level security properties. However, verifying that less abstract system speciications satisfy low level security properties has been largely impractical. This is evidenced by innumerable system vulnerabilities where high level properties are not attained due to failed assumptions of low level properties. This paper presents ongoing work on investigating known and chosen ciphertext pairs using the NRL Protocol Analyzer. We give a formal characterization of known and chosen pairs, and map it to the NRL Protocol Analyzer model. We also describe the use of the Analyzer to rediscover attacks on an early version of the ESP protocol, and show how our experience in using it has led us to reene our model. This was the rst use of the Analyzer to model protocols at such a low level of abstraction. 1 Background A chosen text attack is characterized by an adversary causing another principal to encrypt or decrypt chosen text using a secret key unknown to the adversary. A known text attack is characterized by an adversary learning encrypted or decrypted text not necessarily chosen by the adversary. Chosen-and known-text in cryptographically protected systems is an important area of study since its presence can lead to vulnerabilities. Chosen-ciphertext can enable the adversary to read conndential messages. Chosen-plaintext can enable the adversary to create messages that may be accepted as legitimate. It can also be used by the adversary to conduct a dictionary attack in an attempt to learn secrets. The problem is compounded when the same key is used for diierent protocols. Guidance on how to avoid chosen-and known-text attacks has been in the literature for many years 11]. However, attacks based on chosen-and known-text continue to be a problem even in security protocols designed and reviewed by teams of security experts. In spite of this, little work has been done on developing formal theories and techniques for detection and prevention of chosen and known text attacks. This is mainly because the degree of abstraction at which the problem occurs is at a somewhat lower level than that usually handled by most of the existing applications of formal methods of cryptographic protocols. However, as the work of Stubblebine and Gligor …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

State Space Reduction in the Maude-NRL Protocol Analyzer

The Maude-NRL Protocol Analyzer (Maude-NPA) is a tool and inference system for reasoning about the security of cryptographic protocols in which the cryptosystems satisfy different equational properties. It both extends and provides a formal framework for the original NRL Protocol Analyzer, which supported equational reasoning in a more limited way. Maude-NPA supports a wide variety of algebraic...

متن کامل

Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm

Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...

متن کامل

A Model of Computation for the NRL Protocol Analyzer

In this paper we develop a model of computation for the NRL Protocol Analyzer by modifying and extending the model of computation for Burroughs, Abadi, and Needham (BAN) logic developed by Abadi and Tuttle. We use the results to point out the similarities and di erences between the NRL Protocol Analyzer and BAN logic, and discuss the issues this raises with respect to the possible integration o...

متن کامل

Analysis of the Internet Key Exchange Protocol using the NRL Protocol Analyzer

In this paper we show how the NRL Protocol Analyzer, a special-purpose formal methods tool designed for the veri cation of cryptographic protocols, was used in the analysis of the Internet Key Exchange (IKE) protocol. We describe some of the challenges we faced in analyzing IKE, which speci es a set of closely related subprotocols, and we show how this led to a number of improvements to the Ana...

متن کامل

Total break of Zorro using linear and differential attacks

An AES-like lightweight block cipher, namely Zorro, was proposed in CHES 2013. While it has a 16-byte state, it uses only 4 S-Boxes per round. This weak nonlinearity was widely criticized, insofar as it has been directly exploited in all the attacks on Zorro reported by now, including the weak key, reduced round, and even full round attacks. In this paper, using some properties discovered by Wa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997