Validating Integrity for the Ephemerizer's Protocol with CL-Atse

  • Authors:
  • Charu Arora;Mathieu Turuani

  • Affiliations:
  • Indian Institute of Technology, Delhi, India;Loria-INRIA, Vandoeuvre-lès-Nancy, France

  • Venue:
  • Formal to Practical Security
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

It is usually very difficult in Computer Science to make an information "disappear" after a certain time, once it has been published or mirrored by servers world wide. This, however, is the goal of the IBM ephemerizer's protocol by Radia Perlman. We present in this paper the general structure of the CL-Atse protocol analysis tool from the AVISPA's tool-suite, and symbolic analysis of the ephemerizer's protocol and its extensions using CL-Atse. This protocol allows transmitting a data which retrieval is guarantied to be impossible after a certain time. We show that this protocol is secure for this property plus the secrecy of the data, but is trivially non secure for its integrity. We model a standard integrity check as a first extension to this protocol, which is natural and close to common usage, and we present a second extension for integrity that is much less obvious and deeply integrated in the structure of the ephemerizer's protocol. Then, we show that while the first extension guaranty the basic integrity property under certain conditions, the second one is much stronger and allows faster computations.