Provably repairing the ISO/IEC 9798 standard for entity authentication

  • Authors:
  • David Basin;Cas Cremers;Simon Meier

  • Affiliations:
  • Institute of Information Security, ETH Zurich, Switzerland;Institute of Information Security, ETH Zurich, Switzerland;Institute of Information Security, ETH Zurich, Switzerland

  • Venue:
  • POST'12 Proceedings of the First international conference on Principles of Security and Trust
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

We formally analyze the family of entity authentication protocols defined by the ISO/IEC 9798 standard and find numerous weaknesses, both old and new, including some that violate even the most basic authentication guarantees. We analyse the cause of these weaknesses, propose repaired versions of the protocols, and provide automated, machine-checked proofs of the correctness of the resulting protocols. From an engineering perspective, we propose two design principles for security protocols that suffice to prevent all the weaknesses. Moreover, we show how modern verification tools can be used for falsification and certified verification of security standards. The relevance of our findings and recommendations has been acknowledged by the responsible ISO working group and an updated version of the standard will be released.