v erification de protocoles cryptographiques en pr esence
play

V erification de protocoles cryptographiques en pr esence de th - PowerPoint PPT Presentation

V erification de protocoles cryptographiques en pr esence de th eories equationnelles V erification de protocoles cryptographiques en pr esence de th eories equationnelles Pascal Lafourcade LSV, UMR 8643, CNRS, ENS de


  1. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Pascal Lafourcade LSV, UMR 8643, CNRS, ENS de Cachan & INRIA Futurs LIF, UMR 6166, CNRS & Universit´ e Aix-Marseille 1 Cachan : September 25th 2006 1 / 37

  2. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation Cryptographic Protocols Osiris communicates with Isis via the net. 2 / 37

  3. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation Cryptographic Protocols Intruder Osiris communicates with Isis via the net. 2 / 37

  4. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation Cryptographic Protocols Intruder Osiris communicates with Isis via the net. Secrecy Property: Intruder cannot learn a secret data. 2 / 37

  5. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation Applications 3 / 37

  6. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation Cryptography Symmetric Encryption (DES, AES) encryption decryption symmetric key 4 / 37

  7. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation Cryptography Symmetric Encryption (DES, AES) encryption decryption symmetric key Asymmetric Encryption (RSA) encryption decryption public key private key 4 / 37

  8. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation Example : 5 / 37

  9. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation Example : 5 / 37

  10. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation Example : 5 / 37

  11. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation Example : Shamir 3-Pass Protocol 1 O → I : { m } K O 5 / 37

  12. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation Example : Shamir 3-Pass Protocol 1 O → I : { m } K O 2 I → O : {{ m } K O } K I 5 / 37

  13. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation Example : Shamir 3-Pass Protocol 1 O → I : { m } K O Commutative 2 I → O : {{ m } K O } K I = {{ m } K I } K O Encryption 5 / 37

  14. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation Example : Shamir 3-Pass Protocol 1 O → I : { m } K O Commutative 2 I → O : {{ m } K O } K I = {{ m } K I } K O Encryption 3 O → I : { m } K I 5 / 37

  15. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation Attacks Cryptanalysis 6 / 37

  16. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation Attacks Cryptanalysis 6 / 37

  17. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation Attacks Cryptanalysis Logical Attack Perfect Encryption hypothesis Needham-Schroeder Public Key Protocol (1978) “Man in the middle attack” [Lowe’96] 6 / 37

  18. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation Attacks Cryptanalysis Logical Attack + Algebraic properties Perfect Encryption hypothesis Needham-Schroeder Public Key Protocol (1978) “Man in the middle attack” [Lowe’96] 6 / 37

  19. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation Formal Approach Symbolic abstraction Messages represented by terms - { m } k - � m 1 , m 2 � Perfect encryption hypothesis 7 / 37

  20. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation Formal Approach Symbolic abstraction Messages represented by terms - { m } k - � m 1 , m 2 � Perfect encryption hypothesis Useful abstraction [Clark & Jacob’97] Automatic verification with Tools: AVISPA, Casper/FDR, Hermes, Murphi, NRL, Proverif, Scyther ... 7 / 37

  21. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation Formal Approach Symbolic abstraction Messages represented by terms - { m } k - � m 1 , m 2 � Perfect encryption hypothesis + algebraic properties Useful abstraction [Clark & Jacob’97] Automatic verification with Tools: AVISPA, Casper/FDR, Hermes, Murphi, NRL, Proverif, Scyther ... 7 / 37

  22. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation The Intruder is the Network (Worst Case) 8 / 37

  23. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation The Intruder is the Network (Worst Case) Listen Passive: Intruder deduction problem 8 / 37

  24. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation The Intruder is the Network (Worst Case) Listen Intercept message (Re)play message Passive: Intruder deduction problem Delete message Active: Security problem 8 / 37

  25. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation The Intruder is the Network (Worst Case) Listen Intercept message (Re)play message Passive: Intruder deduction problem Delete message Active: Security problem Intruder Capabilities (Dolev-Yao Model 80’s) Encryption, Decryption with a key Pairing, Projection. 8 / 37

  26. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation The Intruder is the Network (Worst Case) Listen Intercept message (Re)play message Passive: Intruder deduction problem Delete message Active: Security problem Intruder Capabilities (Dolev-Yao Model 80’s) Encryption, Decryption with a key Pairing, Projection. In general security problem undecidable [DLMS’99, AC’01] 8 / 37

  27. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation The Intruder is the Network (Worst Case) Listen Intercept message (Re)play message Passive: Intruder deduction problem Delete message Active: Security problem Intruder Capabilities (Dolev-Yao Model 80’s) Encryption, Decryption with a key Pairing, Projection. In general security problem undecidable [DLMS’99, AC’01] Bounded number of session ⇒ Decidability [AL’00, RT’01] 8 / 37

  28. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation Logical Attack on Shamir 3-Pass Protocol (I) Perfect encryption one-time pad (Vernam Encryption) { m } k = m ⊕ k XOR Properties (ACUN) ( x ⊕ y ) ⊕ z = x ⊕ ( y ⊕ z ) A ssociativity x ⊕ y = y ⊕ x C ommutativity x ⊕ 0 = x U nity x ⊕ x = 0 N ilpotency 9 / 37

  29. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation Logical Attack on Shamir 3-Pass Protocol (I) Perfect encryption one-time pad (Vernam Encryption) { m } k = m ⊕ k XOR Properties (ACUN) ( x ⊕ y ) ⊕ z = x ⊕ ( y ⊕ z ) A ssociativity x ⊕ y = y ⊕ x C ommutativity x ⊕ 0 = x U nity x ⊕ x = 0 N ilpotency Vernam encryption is a commutative encryption : {{ m } K O } K I = ( m ⊕ K O ) ⊕ K I = ( m ⊕ K I ) ⊕ K O = {{ m } K I } K O 9 / 37

  30. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation Logical Attack on Shamir 3-Pass Protocol (II) Perfect encryption one-time pad (Vernam Encryption) { m } k = m ⊕ k Shamir 3-Pass Protocol 1 O → I : m ⊕ K O 2 I → O : ( m ⊕ K O ) ⊕ K I 3 O → I : m ⊕ K I Passive attacker : m ⊕ K O m ⊕ K O ⊕ K I m ⊕ K I 10 / 37

  31. V´ erification de protocoles cryptographiques en pr´ esence de th´ eories ´ equationnelles Introduction & Motivation Logical Attack on Shamir 3-Pass Protocol (II) Perfect encryption one-time pad (Vernam Encryption) { m } k = m ⊕ k Shamir 3-Pass Protocol 1 O → I : m ⊕ K O 2 I → O : ( m ⊕ K O ) ⊕ K I 3 O → I : m ⊕ K I Passive attacker : m ⊕ K O ⊕ m ⊕ K O ⊕ K I ⊕ m ⊕ K I = m 10 / 37

Recommend


More recommend