Cryptology ePrint Archive: Report 2005/171

Towards computationally sound symbolic analysis of key exchange protocols

Prateek Gupta and Vitaly Shmatikov

Abstract: We present a cryptographically sound formal method for proving correctness of key exchange protocols. Our main tool is a fragment of a symbolic protocol logic. We demonstrate that proofs of key agreement and key secrecy in this logic imply simulatability in Shoup's secure multi-party framework for key exchange. As part of the logic, we present cryptographically sound abstractions of CMA-secure digital signatures and a restricted form of Diffie-Hellman exponentiation, which is a technical result of independent interest. We illustrate our method by constructing a proof of security for a simple authenticated Diffie-Hellman protocol.

Category / Keywords: Cryptographic protocols / key exchange, formal methods, symbolic analysis

Publication Info: Extended abstract of this paper was published in the 3rd ACM Workshop on Formal Methods in Security Engineering

Date: received 9 Jun 2005, last revised 15 Sep 2005

Contact author: shmat at cs utexas edu

Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation

Version: 20050915:160056 (All versions of this report)

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]