Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses

被引:0
|
作者
Cheval, Vincent [1 ]
Cremers, Cas [2 ]
Dax, Alexander
Hirschi, Lucca [3 ,4 ]
Jacomme, Charlie [1 ]
Kremer, Steve [5 ]
机构
[1] Inria Paris, Paris, France
[2] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
[3] Inria, Paris, France
[4] LORIA, Vandaenvre Les Nancy, France
[5] Univ Lorraine, LORIA, Inria Nancy Grand Est, Metz, France
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most cryptographic protocols use cryptographic hash functions as a building block. The security analyses of these protocols typically assume that the hash functions are perfect (such as in the random oracle model). However, in practice, most widely deployed hash functions are far from perfect - and as a result, the analysis may miss attacks that exploit the gap between the model and the actual hash function used. We develop the first methodology to systematically discover attacks on security protocols that exploit weaknesses in widely deployed hash functions. We achieve this by revisiting the gap between theoretical properties of hash functions and the weaknesses of real-world hash functions, from which we develop a lattice of threat models. For all of these threat models, we develop fine-grained symbolic models. Our methodology's fine-grained models cannot be directly encoded in existing state-of-the-art analysis tools by just using their equational reasoning. We therefore develop extensions for the two leading tools, TAMARIN and PROVERIF. In extensive case studies using our methodology, the extended tools rediscover all attacks that were previously reported for these protocols and discover several new variants.
引用
收藏
页码:5899 / 5916
页数:18
相关论文
共 50 条
  • [41] RFID Bi-directional Authentication Protocol Based on Random Number and Hash Function
    Liu Jian-dong
    Wang Ye-quan
    Zhang Xiao
    Shang Kai
    PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 919 - 922
  • [42] Proposing and verifying a security protocol for hash function-based IoT communication system
    Kun-Hee Han
    Woo-Sik Bae
    Cluster Computing, 2016, 19 : 497 - 504
  • [43] Proposing and verifying a security protocol for hash function-based IoT communication system
    Han, Kun-Hee
    Bae, Woo-Sik
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (01): : 497 - 504
  • [44] An One-way Hash Function Based Lightweight Mutual Authentication RFID Protocol
    Ren, Xuping
    Xu, Xianghua
    Li, Yunfa
    JOURNAL OF COMPUTERS, 2013, 8 (09) : 2405 - 2412
  • [45] Hash function and DSRC based secure communication protocol for VANET-WAVE architecture
    Kumar, Surender
    Singh, Vikram
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (03): : 829 - 839
  • [46] Internal differential collision attacks on the reduced-round Grøstl-0 hash function
    Kota Ideguchi
    Elmar Tischhauser
    Bart Preneel
    Designs, Codes and Cryptography, 2014, 70 : 251 - 271
  • [47] Preimage and pseudo-collision attacks on step-reduced SM3 hash function
    Wang, Gaoli
    Shen, Yanzhao
    INFORMATION PROCESSING LETTERS, 2013, 113 (08) : 301 - 306
  • [48] RFID mutual-authentication protocol with synchronous updated-keys based on Hash function
    School of Information Engineering, Jiangxi University of Science and Technology, Ganzhou
    341000, China
    J. China Univ. Post Telecom., 6 (27-35):
  • [49] Low-cost Authentication Protocol of RFID System Using One Block Hash Function
    Jin, Shi-mei
    You, Mo
    Li, Yong-zhen
    2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 671 - 676
  • [50] An Access Control Protocol for Wireless Sensor Network Using Double Trapdoor Chameleon Hash Function
    Thakur, Tejeshwari
    JOURNAL OF SENSORS, 2016, 2016