Computational soundness of formal reasoning about indistinguishability and non-malleability of cryptographic expressions

Analysis and verification of security protocols are typically carried out in two different models of cryptography: formal cryptography and computational cryptography. Formal cryptography, originally inspired by the work of Dolev and Yao [14], takes an abstract and idealized view of security, and d...

Full description

Bibliographic Details
Main Author: Hajiabadi, Mohammad
Other Authors: Kapron, Bruce
Format: Others
Language:English
en
Published: 2011
Subjects:
Online Access:http://hdl.handle.net/1828/3496
id ndltd-uvic.ca-oai-dspace.library.uvic.ca-1828-3496
record_format oai_dc
spelling ndltd-uvic.ca-oai-dspace.library.uvic.ca-1828-34962017-07-11T06:01:00Z Computational soundness of formal reasoning about indistinguishability and non-malleability of cryptographic expressions Hajiabadi, Mohammad Kapron, Bruce Formal and Computational Security Analysis Computational Soundness Dolev-Yao Non-Malleability Indistinguishability of Expressions Inductive and Co-Inductive Formal Semantics Analysis and verification of security protocols are typically carried out in two different models of cryptography: formal cryptography and computational cryptography. Formal cryptography, originally inspired by the work of Dolev and Yao [14], takes an abstract and idealized view of security, and develops its proof techniques based on methods and ideas from logic and theory of programming languages. It makes strong assumptions about cryptographic operations by treating them as perfectly-secure symbolic operations. Computational cryptography, on the other hand, has developed its foundations based on complexity theory. Messages are viewed as bit-strings, and cryptographic operations are treated as actual transformations on bit-strings with certain asymptotic properties.In this thesis, we explore the relation between the Dolev-Yao model and the computational model of public-key cryptography in two contexts: indistinguishability and non-malleability of expressions. This problem in the absence of key-cycles is partially addressed in [20, 21] by Herzog. We adapt our approach to use the co-inductive definition of symbolic security, whose private-key treatment was considered in coinduction, and establish our main results as follow: Using a co-inductive approach, we extend the indistinguishability and non-malleability results of Herzog in the presence of key-cycles. By providing a counter-example, we show that the indistinguishability property in this setting is strictly stronger than the non-malleability property, which gives a negative answer to Herzog's conjecture that they are equivalent. we prove that despite the fact that IND-CCA2 security provides non-malleability in our setting, the same result does not hold for IND-CCA1 security. We prove that, under certain hypothesis, our co-inductive formal indistinguishability is computationally-complete in the absence of key-cycles and with respect to any \emph{length-revealing} encryption scheme. In the presence of key-cycles, we prove that the completeness does not hold even with respect to IND-CPA security. Graduate 2011-08-24T23:09:00Z 2011-08-24T23:09:00Z 2011 2011-08-24 Thesis http://hdl.handle.net/1828/3496 English en Available to the World Wide Web application/pdf
collection NDLTD
language English
en
format Others
sources NDLTD
topic Formal and Computational Security Analysis
Computational Soundness
Dolev-Yao Non-Malleability
Indistinguishability of Expressions
Inductive and Co-Inductive Formal Semantics
spellingShingle Formal and Computational Security Analysis
Computational Soundness
Dolev-Yao Non-Malleability
Indistinguishability of Expressions
Inductive and Co-Inductive Formal Semantics
Hajiabadi, Mohammad
Computational soundness of formal reasoning about indistinguishability and non-malleability of cryptographic expressions
description Analysis and verification of security protocols are typically carried out in two different models of cryptography: formal cryptography and computational cryptography. Formal cryptography, originally inspired by the work of Dolev and Yao [14], takes an abstract and idealized view of security, and develops its proof techniques based on methods and ideas from logic and theory of programming languages. It makes strong assumptions about cryptographic operations by treating them as perfectly-secure symbolic operations. Computational cryptography, on the other hand, has developed its foundations based on complexity theory. Messages are viewed as bit-strings, and cryptographic operations are treated as actual transformations on bit-strings with certain asymptotic properties.In this thesis, we explore the relation between the Dolev-Yao model and the computational model of public-key cryptography in two contexts: indistinguishability and non-malleability of expressions. This problem in the absence of key-cycles is partially addressed in [20, 21] by Herzog. We adapt our approach to use the co-inductive definition of symbolic security, whose private-key treatment was considered in coinduction, and establish our main results as follow: Using a co-inductive approach, we extend the indistinguishability and non-malleability results of Herzog in the presence of key-cycles. By providing a counter-example, we show that the indistinguishability property in this setting is strictly stronger than the non-malleability property, which gives a negative answer to Herzog's conjecture that they are equivalent. we prove that despite the fact that IND-CCA2 security provides non-malleability in our setting, the same result does not hold for IND-CCA1 security. We prove that, under certain hypothesis, our co-inductive formal indistinguishability is computationally-complete in the absence of key-cycles and with respect to any \emph{length-revealing} encryption scheme. In the presence of key-cycles, we prove that the completeness does not hold even with respect to IND-CPA security. === Graduate
author2 Kapron, Bruce
author_facet Kapron, Bruce
Hajiabadi, Mohammad
author Hajiabadi, Mohammad
author_sort Hajiabadi, Mohammad
title Computational soundness of formal reasoning about indistinguishability and non-malleability of cryptographic expressions
title_short Computational soundness of formal reasoning about indistinguishability and non-malleability of cryptographic expressions
title_full Computational soundness of formal reasoning about indistinguishability and non-malleability of cryptographic expressions
title_fullStr Computational soundness of formal reasoning about indistinguishability and non-malleability of cryptographic expressions
title_full_unstemmed Computational soundness of formal reasoning about indistinguishability and non-malleability of cryptographic expressions
title_sort computational soundness of formal reasoning about indistinguishability and non-malleability of cryptographic expressions
publishDate 2011
url http://hdl.handle.net/1828/3496
work_keys_str_mv AT hajiabadimohammad computationalsoundnessofformalreasoningaboutindistinguishabilityandnonmalleabilityofcryptographicexpressions
_version_ 1718495816980627456