The faithfulness of abstract protocol analysis: message authentication

  • Authors:
  • Joshua D. Guttman;F. Javier Thayer;Lenore D. Zuck

  • Affiliations:
  • The MITRE Corporation, Bedford, MA;The MITRE Corporation, Bedford MA;New York University, NY

  • Venue:
  • Journal of Computer Security - Special issue on ACM conference on computer and communications security, 2001
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Dolev and Yao initiated an approach to studying cryptographic protocols which abstracts from possible problems with the cryptography so as to focus on the structural aspects of the protocol. Recent work in this framework has developed easily applicable methods to determine many security properties of protocols. A separate line of work, initiated by Bellare and Rogaway, analyzes the way specific cryptographic primitives are used in protocols. It gives asymptotic bounds on the risk of failures of secrecy or authentication. In this paper we show how the Dolev-Yao model may be used for protocol analysis, while a further analysis gives a quantitative bound on the extent to which real cryptographic primitives may diverge from the idealized model. We illustrate this method where the cryptographic primitives are based on Carter-Wegman universal classes of hash functions. This choice allows us to give specific quantitative bounds rather than simply asymptotic bounds.