A Modular Security Analysis of the TLS Handshake Protocol

被引:0
|
作者
Morrissey, P. [1 ]
Smart, N. P. [1 ]
Warinschi, B. [1 ]
机构
[1] Univ Bristol, Dept Comp Sci, Bristol BS8 1UB, Avon, England
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modularity present in the design of the protocol: the application keys offered to higher level applications are obtained from a master key, which in turn is derived, through interaction, from a pre-master key. Our first contribution consists of formal models that clarify the security level enjoyed by each of these types of keys. The models that we provide fall under well established paradigms in defining execution, and security notions. We capture the realistic setting where only one of the two parties involved in the execution of the protocol (namely the server) has a certified public key, and where the same master key is used to generate multiple application keys. The main contribution of the paper is a modular and generic proof of security for the application keys established through the TLS protocol. We show that the transformation used by TLS to derive master keys essentially transforms an arbitrary secure pre-master key agreement protocol into a secure master-key agreement protocol. Similarly, the transformation used to derive application keys works when applied to an arbitrary secure master-key agreement protocol. These results are in the random oracle model. The security of the overall protocol then follows from proofs of security for the basic pre-master key generation protocols employed by TLS.
引用
收藏
页码:55 / 73
页数:19
相关论文
共 50 条
  • [1] The TLS Handshake Protocol: A Modular Analysis
    Morrissey, P.
    Smart, N. P.
    Warinschi, B.
    [J]. JOURNAL OF CRYPTOLOGY, 2010, 23 (02) : 187 - 223
  • [2] The TLS Handshake Protocol: A Modular Analysis
    P. Morrissey
    N. P. Smart
    B. Warinschi
    [J]. Journal of Cryptology, 2010, 23 : 187 - 223
  • [3] A Cryptographic Analysis of the TLS 1.3 Handshake Protocol
    Dowling, Benjamin
    Fischlin, Marc
    Gunther, Felix
    Stebila, Douglas
    [J]. JOURNAL OF CRYPTOLOGY, 2021, 34 (04)
  • [4] A Cryptographic Analysis of the TLS 1.3 Handshake Protocol
    Benjamin Dowling
    Marc Fischlin
    Felix Günther
    Douglas Stebila
    [J]. Journal of Cryptology, 2021, 34
  • [5] An Improved TLS handshake protocol
    Li Xian-Zhu
    Liu Jun
    [J]. PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 130 - 136
  • [6] A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
    Dowling, Benjamin
    Fischlin, Marc
    Guenther, Felix
    Stebila, Douglas
    [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1197 - 1210
  • [7] Analysis and Comparison of Several algorithms in SSL/TLS Handshake Protocol
    Luo Qing
    Lin Yaping
    [J]. ITCS: 2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, PROCEEDINGS, VOL 2, PROCEEDINGS, 2009, : 613 - +
  • [8] Delay Measurement of 0-RTT Transport Layer Security (TLS) Handshake Protocol
    Goncharskyi, Danylo
    Kim, Sung Yong
    Serhrouchni, Ahmed
    Gu, Pengwenlong
    Khatoun, Rida
    Hachem, Joel
    [J]. 2022 8TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT'22), 2022, : 1450 - 1454
  • [9] On the Security of the TLS Protocol: A Systematic Analysis
    Krawczyk, Hugo
    Paterson, Kenneth G.
    Wee, Hoeteck
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT I, 2013, 8042 : 429 - 448
  • [10] Extending the TLS Protocol by EAP Handshake to Build a Security Architecture for Heterogenous Wireless Network
    Grochla, Krzysztof
    Stolarz, Piotr
    [J]. COMPUTER NETWORKS, CN 2013, 2013, 370 : 258 - 267