On the Security of the TLS Protocol: A Systematic Analysis

被引:0
|
作者
Krawczyk, Hugo [1 ]
Paterson, Kenneth G. [2 ]
Wee, Hoeteck [3 ]
机构
[1] IBM Res, Bangalore, Karnataka, India
[2] Univ London, London WC1E 7HU, England
[3] George Washington Univ, Washington, DC 20052 USA
基金
英国工程与自然科学研究理事会;
关键词
RSA ENCRYPTION; KEY-EXCHANGE; ATTACKS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
TLS is the most widely-used cryptographic protocol on the Internet. It comprises the TLS Handshake Protocol, responsible for authentication and key establishment, and the TLS Record Protocol, which takes care of subsequent use of those keys to protect bulk data. In this paper, we present the most complete analysis to date of the TLS Handshake protocol and its application to data encryption (in the Record Protocol). We show how to extract a key-encapsulation mechanism (KEM) from the TLS Handshake Protocol, and how the security of the entire TLS protocol follows from security properties of this KEM when composed with a secure authenticated encryption scheme in the Record Protocol. The security notion we achieve is a variant of the ACCE notion recently introduced by Jager et al. (Crypto '12). Our approach enables us to analyse multiple different key establishment methods in a modular fashion, including the first proof of the most common deployment mode that is based on RSA PKCS # 1v1.5 encryption, as well as Diffie-Hellman modes. Our results can be applied to settings where mutual authentication is provided and to the more common situation where only server authentication is applied.
引用
收藏
页码:429 / 448
页数:20
相关论文
共 50 条
  • [1] A Modular Security Analysis of the TLS Handshake Protocol
    Morrissey, P.
    Smart, N. P.
    Warinschi, B.
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 55 - 73
  • [2] Security analysis of TLS protocol implementations based on model checking
    Bi X.
    Tang C.
    [J]. Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2021, 43 (03): : 839 - 846
  • [3] Security Analysis and Improvement of TNC IF-T Protocol Binding to TLS
    Xiao Yuelei
    Wang Yumin
    Pang Liaojun
    [J]. CHINA COMMUNICATIONS, 2013, 10 (07) : 85 - 92
  • [4] Implementation of a Security Layer for the SSL/TLS Protocol
    Ordean, Mihai
    Giurgiu, Mircea
    [J]. 2010 9TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS (ISETC), 2010, : 209 - 212
  • [5] A systematic security analysis of EMV protocol
    Lan, Xiao
    Xu, Jing
    Zhang, Zhenfeng
    Chen, Xingshu
    Luo, Yonggang
    [J]. COMPUTER STANDARDS & INTERFACES, 2023, 84
  • [6] Formal Analysis and Optimization of TLS1.3 Protocol in Strong Security Model
    Lu S.-Q.
    Zhou S.-Y.
    Mao Y.
    [J]. Ruan Jian Xue Bao/Journal of Software, 2021, 32 (09): : 2849 - 2866
  • [7] Security Analysis and Optimization of TLS1.3 Protocol Based on HCPN Model
    Xie, Pengshou
    Li, Wei
    Kang, Yongping
    Feng, Tao
    Zhu, Jiafeng
    Yang, Xinghui
    [J]. International Journal of Network Security, 2024, 26 (04) : 622 - 634
  • [8] Security Analysis of TLS Authentication
    Ranjan, Aditya Kaushal
    Kumar, Vijay
    Hussain, Muzzammil
    [J]. 2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 1356 - 1360
  • [9] Multifactor TLS protocol for holistic security in mobile environment
    Talukder, Asoke K.
    Sharma, Devashish
    Rao, Vedula Bhaskar
    [J]. IETE JOURNAL OF RESEARCH, 2006, 52 (2-3) : 239 - 246
  • [10] A comprehensive study on security attacks on SSL/TLS Protocol
    Sirohi, Preeti
    Agarwal, Amit
    Tyagi, Sapna
    [J]. PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2016, : 893 - 897