Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses

被引:0
|
作者
Cheval, Vincent [1 ]
Cremers, Cas [2 ]
Dax, Alexander
Hirschi, Lucca [3 ,4 ]
Jacomme, Charlie [1 ]
Kremer, Steve [5 ]
机构
[1] Inria Paris, Paris, France
[2] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
[3] Inria, Paris, France
[4] LORIA, Vandaenvre Les Nancy, France
[5] Univ Lorraine, LORIA, Inria Nancy Grand Est, Metz, France
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most cryptographic protocols use cryptographic hash functions as a building block. The security analyses of these protocols typically assume that the hash functions are perfect (such as in the random oracle model). However, in practice, most widely deployed hash functions are far from perfect - and as a result, the analysis may miss attacks that exploit the gap between the model and the actual hash function used. We develop the first methodology to systematically discover attacks on security protocols that exploit weaknesses in widely deployed hash functions. We achieve this by revisiting the gap between theoretical properties of hash functions and the weaknesses of real-world hash functions, from which we develop a lattice of threat models. For all of these threat models, we develop fine-grained symbolic models. Our methodology's fine-grained models cannot be directly encoded in existing state-of-the-art analysis tools by just using their equational reasoning. We therefore develop extensions for the two leading tools, TAMARIN and PROVERIF. In extensive case studies using our methodology, the extended tools rediscover all attacks that were previously reported for these protocols and discover several new variants.
引用
收藏
页码:5899 / 5916
页数:18
相关论文
共 50 条
  • [31] Security of the Poseidon Hash Function Against Non-Binary Differential and Linear Attacks
    L. Kovalchuk
    R. Oliynykov
    M. Rodinko
    Cybernetics and Systems Analysis, 2021, 57 : 268 - 278
  • [32] Formal Verification of an RFID Authentication Protocol Based on Hash Function and Secret Code
    Woo-Sik, Bae
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 79 (04) : 2595 - 2609
  • [33] Quantum Authentication Protocol for Classical Messages Based on Bell states and Hash Function
    Xin, Xiangjun
    Hua, Xiaolin
    Song, Jianpo
    Li, Fagen
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 285 - 291
  • [35] RFID mutual-authentication protocol with synchronous updatedkeys based on Hash function
    Zhang Xiaohong
    Hu Yingmeng
    The Journal of China Universities of Posts and Telecommunications, 2015, (06) : 27 - 35
  • [36] Formal Verification of an RFID Authentication Protocol Based on Hash Function and Secret Code
    Bae Woo-Sik
    Wireless Personal Communications, 2014, 79 : 2595 - 2609
  • [37] RFID mutual-authentication protocol with synchronous updatedkeys based on Hash function
    Zhang Xiaohong
    Hu Yingmeng
    The Journal of China Universities of Posts and Telecommunications, 2015, 22 (06) : 27 - 35
  • [38] Preimage and pseudo collision attacks on round-reduced DHA-256 hash function
    Zou, Jian
    Wu, Wen-Ling
    Wu, Shuang
    Dong, Le
    Tongxin Xuebao/Journal on Communications, 2013, 34 (06): : 8 - 15
  • [39] Erratum to: A novel secure and efficient hash function with extra padding against rainbow table attacks
    Hyung-Jin Mun
    Sunghyuck Hong
    Jungpil Shin
    Cluster Computing, 2018, 21 : 1187 - 1187
  • [40] Internal differential collision attacks on the reduced-round Grostl-0 hash function
    Ideguchi, Kota
    Tischhauser, Elmar
    Preneel, Bart
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 70 (03) : 251 - 271