We present a symbolic protocol logic for reasoning about authentication and key confirmation in key exchange protocols. The logic is cryptographically sound: a symbolic proof of authentication and secrecy implies that the protocol is secure in the adaptive corruptions model. We illustrate our method by formally proving security of an authenticated Diffie-Hellman protocol with key confirmation.
Category / Keywords: cryptographic protocols, formal methods, computational soundness Publication Info: FCS-ARSPA 2006 (Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis) Date: received 16 May 2006, last revised 17 Jul 2006 Contact author: shmat at cs utexas edu Available formats: Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation Version: 20060717:204620 (All versions of this report) Discussion forum: Show discussion | Start new discussion