Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses

被引:0
|
作者
Cheval, Vincent [1 ]
Cremers, Cas [2 ]
Dax, Alexander
Hirschi, Lucca [3 ,4 ]
Jacomme, Charlie [1 ]
Kremer, Steve [5 ]
机构
[1] Inria Paris, Paris, France
[2] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
[3] Inria, Paris, France
[4] LORIA, Vandaenvre Les Nancy, France
[5] Univ Lorraine, LORIA, Inria Nancy Grand Est, Metz, France
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most cryptographic protocols use cryptographic hash functions as a building block. The security analyses of these protocols typically assume that the hash functions are perfect (such as in the random oracle model). However, in practice, most widely deployed hash functions are far from perfect - and as a result, the analysis may miss attacks that exploit the gap between the model and the actual hash function used. We develop the first methodology to systematically discover attacks on security protocols that exploit weaknesses in widely deployed hash functions. We achieve this by revisiting the gap between theoretical properties of hash functions and the weaknesses of real-world hash functions, from which we develop a lattice of threat models. For all of these threat models, we develop fine-grained symbolic models. Our methodology's fine-grained models cannot be directly encoded in existing state-of-the-art analysis tools by just using their equational reasoning. We therefore develop extensions for the two leading tools, TAMARIN and PROVERIF. In extensive case studies using our methodology, the extended tools rediscover all attacks that were previously reported for these protocols and discover several new variants.
引用
收藏
页码:5899 / 5916
页数:18
相关论文
共 50 条
  • [21] Key-recovery attacks on universal hash function based MAC algorithms
    Handschuh, Helena
    Preneel, Bart
    ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 144 - +
  • [22] Research on a provable security RFID authentication protocol based on Hash function
    Yinhui, Yu (yuyh@jlu.edu.cn), 2016, Beijing University of Posts and Telecommunications (23):
  • [23] Research on a provable security RFID authentication protocol based on Hash function
    Yu Yinhui
    Zhang Lei
    The Journal of China Universities of Posts and Telecommunications, 2016, 23 (02) : 31 - 37
  • [24] Lightweight RFID Bidirectional Authentication Protocol Based on Improved Hash Function
    Cao, Fang-Ming
    He, Xiao-Ping
    International Journal of Network Security, 2024, 26 (01) : 98 - 105
  • [25] Cryptanalysis of Group Key Agreement Protocol Based on Chaotic Hash Function
    Yoon, Eun-Jun
    Yoo, Kee-Young
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11): : 2167 - 2170
  • [26] On the security of mesh-based media hash-dependent watermarking against protocol attacks
    Lu, CS
    Yu, CM
    2005 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), VOLS 1 AND 2, 2005, : 169 - 172
  • [27] Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128
    Mendel, Florian
    Nad, Tomislav
    Schlaeffer, Martin
    FAST SOFTWARE ENCRYPTION (FSE 2012), 2012, 7549 : 226 - 243
  • [28] Security of the Poseidon Hash Function Against Non-Binary Differential and Linear Attacks
    Kovalchuk, L.
    Oliynykov, R.
    Rodinko, M.
    CYBERNETICS AND SYSTEMS ANALYSIS, 2021, 57 (02) : 268 - 278
  • [29] A novel secure and efficient hash function with extra padding against rainbow table attacks
    Mun, Hyung-Jin
    Hong, Sunghyuck
    Shin, Jungpil
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01): : 1161 - 1173
  • [30] Improved preimage and pseudo-collision attacks on SM3 hash function
    Zou, Jian
    Dong, Le
    Tongxin Xuebao/Journal on Communications, 2018, 39 (01): : 46 - 55