Computational soundness of formal reasoning about indistinguishability and non-malleability of cryptographic expressions
Analysis and verification of security protocols are typically carried out in two different models of cryptography: formal cryptography and computational cryptography. Formal cryptography, originally inspired by the work of Dolev and Yao [14], takes an abstract and idealized view of security, and d...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | English en |
Published: |
2011
|
Subjects: | |
Online Access: | http://hdl.handle.net/1828/3496 |
id |
ndltd-uvic.ca-oai-dspace.library.uvic.ca-1828-3496 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-uvic.ca-oai-dspace.library.uvic.ca-1828-34962017-07-11T06:01:00Z Computational soundness of formal reasoning about indistinguishability and non-malleability of cryptographic expressions Hajiabadi, Mohammad Kapron, Bruce Formal and Computational Security Analysis Computational Soundness Dolev-Yao Non-Malleability Indistinguishability of Expressions Inductive and Co-Inductive Formal Semantics Analysis and verification of security protocols are typically carried out in two different models of cryptography: formal cryptography and computational cryptography. Formal cryptography, originally inspired by the work of Dolev and Yao [14], takes an abstract and idealized view of security, and develops its proof techniques based on methods and ideas from logic and theory of programming languages. It makes strong assumptions about cryptographic operations by treating them as perfectly-secure symbolic operations. Computational cryptography, on the other hand, has developed its foundations based on complexity theory. Messages are viewed as bit-strings, and cryptographic operations are treated as actual transformations on bit-strings with certain asymptotic properties.In this thesis, we explore the relation between the Dolev-Yao model and the computational model of public-key cryptography in two contexts: indistinguishability and non-malleability of expressions. This problem in the absence of key-cycles is partially addressed in [20, 21] by Herzog. We adapt our approach to use the co-inductive definition of symbolic security, whose private-key treatment was considered in coinduction, and establish our main results as follow: Using a co-inductive approach, we extend the indistinguishability and non-malleability results of Herzog in the presence of key-cycles. By providing a counter-example, we show that the indistinguishability property in this setting is strictly stronger than the non-malleability property, which gives a negative answer to Herzog's conjecture that they are equivalent. we prove that despite the fact that IND-CCA2 security provides non-malleability in our setting, the same result does not hold for IND-CCA1 security. We prove that, under certain hypothesis, our co-inductive formal indistinguishability is computationally-complete in the absence of key-cycles and with respect to any \emph{length-revealing} encryption scheme. In the presence of key-cycles, we prove that the completeness does not hold even with respect to IND-CPA security. Graduate 2011-08-24T23:09:00Z 2011-08-24T23:09:00Z 2011 2011-08-24 Thesis http://hdl.handle.net/1828/3496 English en Available to the World Wide Web application/pdf |
collection |
NDLTD |
language |
English en |
format |
Others
|
sources |
NDLTD |
topic |
Formal and Computational Security Analysis Computational Soundness Dolev-Yao Non-Malleability Indistinguishability of Expressions Inductive and Co-Inductive Formal Semantics |
spellingShingle |
Formal and Computational Security Analysis Computational Soundness Dolev-Yao Non-Malleability Indistinguishability of Expressions Inductive and Co-Inductive Formal Semantics Hajiabadi, Mohammad Computational soundness of formal reasoning about indistinguishability and non-malleability of cryptographic expressions |
description |
Analysis and verification of security protocols are typically carried out in two different models of cryptography: formal cryptography and computational cryptography. Formal cryptography, originally inspired by the work of Dolev and Yao [14], takes an abstract and idealized view of security, and develops its proof techniques based on methods and ideas from logic and theory of programming languages. It makes strong assumptions about cryptographic operations by treating them as perfectly-secure symbolic operations. Computational cryptography, on the other hand, has developed its foundations based on complexity theory. Messages are viewed as bit-strings, and cryptographic operations are treated as actual transformations on bit-strings with certain asymptotic properties.In this thesis, we explore the relation between the Dolev-Yao model and the computational model of public-key cryptography in two contexts: indistinguishability and non-malleability of expressions. This problem in the absence of key-cycles is partially addressed in [20, 21] by Herzog. We adapt our approach to use the co-inductive definition of symbolic security, whose private-key treatment was considered in coinduction, and establish our main results as follow:
Using a co-inductive approach, we extend the indistinguishability and non-malleability results of Herzog in the presence of key-cycles.
By providing a counter-example, we show that the indistinguishability property in this setting is strictly stronger than the non-malleability property, which gives a negative answer to Herzog's conjecture that they are equivalent.
we prove that despite the fact that IND-CCA2 security provides non-malleability in our setting, the same result does not hold for IND-CCA1 security.
We prove that, under certain hypothesis, our co-inductive formal indistinguishability is computationally-complete in the absence of key-cycles and with respect to any \emph{length-revealing} encryption scheme. In the presence of key-cycles, we prove that the completeness does not hold even with respect to IND-CPA security. === Graduate |
author2 |
Kapron, Bruce |
author_facet |
Kapron, Bruce Hajiabadi, Mohammad |
author |
Hajiabadi, Mohammad |
author_sort |
Hajiabadi, Mohammad |
title |
Computational soundness of formal reasoning about indistinguishability and non-malleability of cryptographic expressions |
title_short |
Computational soundness of formal reasoning about indistinguishability and non-malleability of cryptographic expressions |
title_full |
Computational soundness of formal reasoning about indistinguishability and non-malleability of cryptographic expressions |
title_fullStr |
Computational soundness of formal reasoning about indistinguishability and non-malleability of cryptographic expressions |
title_full_unstemmed |
Computational soundness of formal reasoning about indistinguishability and non-malleability of cryptographic expressions |
title_sort |
computational soundness of formal reasoning about indistinguishability and non-malleability of cryptographic expressions |
publishDate |
2011 |
url |
http://hdl.handle.net/1828/3496 |
work_keys_str_mv |
AT hajiabadimohammad computationalsoundnessofformalreasoningaboutindistinguishabilityandnonmalleabilityofcryptographicexpressions |
_version_ |
1718495816980627456 |