Cryptology ePrint Archive: Report 2015/1150
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS
Colin Boyd and Britta Hale and Stig Frode Mj°lsnes and Douglas Stebila
Abstract: Authentication and authenticated encryption with associated data (AEAD) are applied in cryptographic protocols to provide message integrity. The definitions in the literature and the constructions used in practice all protect against forgeries, but offer varying levels of protection against replays, reordering, and drops. As a result of the lack of a systematic hierarchy of authentication and AEAD security notions, gaps have arisen in the literature, specifically in the provable security analysis of the Transport Layer Security (TLS) protocol. We present a hierarchy of authentication and AEAD security notions, interpolating between the lowest level of protection (against forgeries) and the highest level (against forgeries, replays, reordering, and drops). We show generically how to construct higher level schemes from a basic scheme and appropriate use of sequence numbers, and apply that to close the gap in the analysis of TLS record layer encryption.
Category / Keywords: cryptographic protocols / authentication, authenticated encryption with associated data (AEAD), Transport Layer Security (TLS) protocol, secure channels
Original Publication (with minor differences): CT-RSA 2016
Date: received 27 Nov 2015, last revised 19 Sep 2016
Contact author: britta hale at item ntnu no
Available format(s): PDF | BibTeX Citation
Note: Small correction to Recv and Decrypt oracle algorithms.
Version: 20160919:152253 (All versions of this report)
Short URL: ia.cr/2015/1150
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]