Fully automated analysis of padding-based encryption in the computational model

  • Authors:
  • Gilles Barthe;Juan Manuel Crespo;Benjamin Grégoire;César Kunz;Yassine Lakhnech;Benedikt Schmidt;Santiago Zanella-Béguelin

  • Affiliations:
  • IMDEA Software Institute, Madrid, Spain;IMDEA Software Institute, Madrid, Spain;INRIA Sophia Antipolis, Sophia Antipolis, France;IMDEA Software Institute, Madrid, Spain;U. de Grenoble & VERIMAG, Grenoble, France;IMDEA Software Institute, Madrid, Spain;Microsoft Research, Cambridge, United Kingdom

  • Venue:
  • Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Computer-aided verification provides effective means of analyzing the security of cryptographic primitives. However, it has remained a challenge to achieve fully automated analyses yielding guarantees that hold against computational (rather than symbolic) attacks. This paper meets this challenge for public-key encryption schemes built from trapdoor permutations and hash functions. Using a novel combination of techniques from computational and symbolic cryptography, we present proof systems for analyzing the chosen-plaintext and chosen-ciphertext security of such schemes in the random oracle model. Building on these proof systems, we develop a toolset that bundles together fully automated proof and attack finding algorithms. We use this toolset to build a comprehensive database of encryption schemes that records attacks against insecure schemes, and proofs with concrete bounds for secure ones.