Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data

  • Authors:
  • Sibylle Fröschle;Graham Steel

  • Affiliations:
  • School of Informatics, University of Oldenburg, Germany;LSV, ENS Cachan & CNRS & INRIA, France

  • Venue:
  • Foundations and Applications of Security Analysis
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

We extend Delaune, Kremer and Steel's framework for analysis of PKCS#11-based APIs from bounded to unbounded fresh data. We achieve this by: formally defining the notion of an attribute policy; showing that a well-designed API should have a certain class of policy we call complete; showing that APIs with complete policies may be safely abstracted to APIs where the attributes are fixed; and proving that these static APIs can be analysed in a small bounded model such that security properties will hold for the unbounded case. We automate analysis in our framework using the SAT-based security protocol model checker SATMC. We show that a symmetric key management subset of the Eracom PKCS#11 API, used in their ProtectServer product, preserves the secrecy of sensitive keys for unbounded numbers of fresh keys and handles, i.e. pointers to keys. We also show that this API is not robust: if an encryption key is lost to the intruder, SATMC finds an attack whereby all the keys may be compromised.