You are looking at a specific version 20200828:185240 of this paper. See the latest version.

Paper 2020/1044

A Cryptographic Analysis of the TLS 1.3 Handshake Protocol

Benjamin Dowling and Marc Fischlin and Felix Günther and Douglas Stebila

Abstract

We analyze the handshake protocol of the Transport Layer Security (TLS) protocol, version 1.3. We address both the full TLS 1.3 handshake (the one round-trip time mode, with signatures for authentication and (elliptic curve) Diffie–Hellman ephemeral ((EC)DHE) key exchange), and the abbreviated resumption/"PSK" mode which uses a pre-shared key for authentication (with optional (EC)DHE key exchange and zero round-trip time key establishment). Our analysis in the reductionist security framework uses a multi-stage key exchange security model, where each of the many session keys derived in a single TLS 1.3 handshake is tagged with various properties (such as unauthenticated versus unilaterally authenticated versus mutually authenticated, whether it is intended to provide forward security, how it is used in the protocol, and whether the key is protected against replay attacks). We show that these TLS 1.3 handshake protocol modes establish session keys with their desired security properties under standard cryptographic assumptions.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published by the IACR in JOC 2021
Keywords
key exchangeTransport Layer Security protocolTLS 1.3
Contact author(s)
dstebila @ uwaterloo ca
History
2023-02-27: last of 2 revisions
2020-08-28: received
See all versions
Short URL
https://ia.cr/2020/1044
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.