Inductive Analysis of Security Protocols in Isabelle/HOL with Applications to Electronic Voting



Similar documents
Electronic Voting Protocol Analysis with the Inductive Method

Verifying security protocols using theorem provers

Q: Why security protocols?

Formal Methods in Security Protocols Analysis

Verifying the SET Purchase Protocols

Inductive Analysis of Security Protocols in Isabelle/HOL with Applications to Electronic Voting

How to Formally Model Features of Network Security Protocols

How to prove security of communication protocols?

Le vote électronique : un défi pour la vérification formelle

CoSign for 21CFR Part 11 Compliance

Attestation and Authentication Protocols Using the TPM

E-Democracy and e-voting

Analysis of Security Requirements for Cryptographic Voting Protocols (Extended Abstract)

Analysis of a Biometric Authentication Protocol for Signature Creation Application

An Electronic Voting System Based On Blind Signature Protocol

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Content Teaching Academy at James Madison University

Information Security Basic Concepts

How To Verify A Bluetooth Device Pairing With A Human Eye Oracle

Modeling and verification of security protocols

Cryptography and Network Security

Security Analysis of PLAID

Cryptography: Authentication, Blind Signatures, and Digital Cash

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Security Analysis of (Un-) Fair Non-repudiation Protocols

A New Receipt-Free E-Voting Scheme Based on Blind Signature (Abstract)

Part 2 D(E(M, K),K ) E(M, K) E(M, K) Plaintext M. Plaintext M. Decrypt with private key. Encrypt with public key. Ciphertext

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

VoteID 2011 Internet Voting System with Cast as Intended Verification

A Draft Framework for Designing Cryptographic Key Management Systems

Cryptography and Network Security Chapter 1

Chap. 1: Introduction

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Verification and Validation Issues in Electronic Voting

Technical report: SeVe implementation

Secure Electronic Voting

Enhanced Privacy ID (EPID) Ernie Brickell and Jiangtao Li Intel Corporation

Chapter 7: Network security

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Computer Security. Draft Exam with Answers

Business Issues in the implementation of Digital signatures

A Search-Based Framework for Security Protocol Synthesis

Introduction. Digital Signature

Fighting product clones through digital signatures

A STRUCTURED APPROACH TO NETWORK SECURITY PROTOCOL IMPLEMENTATION

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan

Computational Soundness of Symbolic Security and Implicit Complexity

Module: Applied Cryptography. Professor Patrick McDaniel Fall CSE543 - Introduction to Computer and Network Security

What is network security?

Adversary Modelling 1

Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm By Mihir Bellare and Chanathip Namprempre

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Table: Security Services (X.800)

Lecture 1: Introduction. CS 6903: Modern Cryptography Spring Nitesh Saxena Polytechnic University

Information Security

CRYPTOGRAPHY IN NETWORK SECURITY

Voucher Web Metering Using Identity Management Systems

Security for Ubiquitous and Adhoc Networks

ZQL. a cryptographic compiler for processing private data. George Danezis. Joint work with Cédric Fournet, Markulf Kohlweiss, Zhengqin Luo

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

Trustis FPS PKI Glossary of Terms

Authentication in WLAN

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Efficient construction of vote-tags to allow open objection to the tally in electronic elections

An Overview of Common Adversary Models

Information System Security

CHAPTER 1 INTRODUCTION

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks

Threat Model for Software Reconfigurable Communications Systems

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

October 2014 Issue No: 2.0. Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services

The Concept of Trust in Network Security

Packet Level Authentication Overview

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

TLS and SRTP for Skype Connect. Technical Datasheet

CSG 399 Lecture. The Inductive Approach to Protocol Analysis p.1

Authentication requirement Authentication function MAC Hash function Security of

Transcription:

Inductive Analysis of Security Protocols in Isabelle/HOL with Applications to Electronic Voting Denis Butin 1 / 37

2 / 37

Introduction Network communication sensitive: banking, private correspondence, business-critical data Cryptography contributes to network security...... But not sufficient in itself! 3 / 37

Security Layers Several levels at which attacks can and have been led: Hardware (e.g. side-channel attacks) Cryptographic primitives Security protocols Ceremonies 4 / 37

Security Protocol Goals Classically: authentication, secret sharing, electronic payment... New, more complex needs: electronic voting, secure multiparty computation, electronic cash... 5 / 37

Analysing Security Protocols Many methods: Model checking Automated / interactive theorem proving Static analysis, applied pi calculus, strand spaces... Tools with automation: ProVerif, AVISPA, Scyther, AKiSs... 6 / 37

Interactive Theorem Proving Uses mathematical reasoning to determine if protocol reaches its security goals Unlike model checking, population unbounded Doesn t provide explicit attack but may give clues Interactive Our choice Isabelle 7 / 37

The Inductive Method Application of Isabelle ( generic proof assistant!) to security protocol verification Paulson 1996, then Bella Uses mathematical induction to model and verify protocols + goals 8 / 37

Principles of the Inductive Method Unbounded number of agents Dedicated datatypes (keys, hashes, nonces... ) Events for message sending, reception, agent knowledge Inductive reasoning over network event lists (traces) Cryptographic algorithms idealised 9 / 37

Threat Model Attacker = Spy Controls network (Dolev-Yao) Eavesdropping + dynamic behaviour, can also act like normal agent 10 / 37

Goal Definition and Proving Protocol security goals predicates over all possible traces User specifies techniques to use: basic induction, rewriting, automatic prover... In most cases, several subgoals generated and user input required again 11 / 37

Modelling Properties Example Authentication of an agent: [[A / bad; B / bad; evs ns public]] = Crypt (pubek A) { Nonce NA, Nonce NB, Agent B } parts (spies evs) Says A B (Crypt (pubek B) { Nonce NA, Agent A }) set evs Says B A (Crypt (pubek A) { Nonce NA, Nonce NB, Agent B }) set evs 12 / 37

Protocols Verified in Isabelle So Far Protocol Class Year Author(s) Yahalom Key sharing, authentication 1996 Paulson NS symmetric Key sharing 1996 Paulson & Bella Otway-Rees (with variants) Authentication 1996 Paulson Woo-Lam Authentication 1996 Paulson Otway-Bull Authentication 1996 Paulson NS asymmetric Authentication 1997 Paulson TLS Multiple 1997 Paulson Kerberos IV Mutual authentication 1998 Bella Kerberos BAN Mutual authentication 1998 Paulson & Bella SET suite Multiple 2000+ Bella et al. Abadi et al. certified e-mail Accountability 2003 Bella et al. Shoup-Rubin smartcard Key distribution 2003 Bella Zhou-Gollmann Non-repudiation 2003 Paulson & Bella Kerberos V Mutual authentication 2007 Bella TESLA Broadcast authentication 2009 Schaller et al. Meadows distance bounding Physical 2009 Basin et al. Multicast NS symmetric Key sharing 2011 Martina Franklin-Reiter Byzantine 2011 Martina Onion routing Anonymising 2011 Li & Pang 13 / 37

New Applications General Approach Adapt Isabelle theory framework (specifications of messages, events, keys, knowledge... ) Model protocol steps Formalise novel guarantees: sometimes hardest step Proofs (interactive) 14 / 37

Analysing Composed Protocols Typical real-world scenario of security protocol use Analysis issue not solved in general, partially supported by Scyther Not done before in the Inductive Method 15 / 37

Protocol Composition Paradigm Certificate distribution sequenced with authentication Specified by two linked inductive models Better guarantee availability (implicit public key binding) 16 / 37

Protocol Composition Discussion Scalable semantics, not limited to two protocols No compositionality theorem as for Scyther Case study extendable to detailed PKI 17 / 37

Auditable Identity-Based Signatures Proposed by David Gray in 2007 Provide stronger non-repudiation than standard IBS (mitigate key escrow) Separate audit step allows third party to ensure signature origin Relies on additional audit key-pair; private one required to sign and registered with KGC 18 / 37

ISO/IEC 9798-3 2010 Amendment presents new authentication protocols We study Five-pass mutual authentication with TTP, initiated by A Side-by-side specification of IBS and AIBS versions Focus is not on the protocol itself but on AIBS 19 / 37

Auditable Identity-Based Signatures Theories 20 / 37

Auditable Identity-Based Signatures Modelling Key package datatype: datatype pack = Pack key key Auditable signature structure: Crypt (prisk A) { Crypt (priek A) M, M } Can only sign with key package + private key: [[evss iso; X synth(analz (spies evss)); Key (priek A) analz (spies evss); Pkg (KP A B) analz (spies evss)]] = Notes Spy Crypt (prisk B) { Crypt (priek A) X, X } # evss iso 21 / 37

Auditable Identity-Based Signatures Modelling candidates function input agent name, output set of potential signers who leave a trace Classic authentication results + focus on signatures Comparative analysis shows operational auditable feature of AIBS 22 / 37

Introduction E-voting use is spreading quickly in the EU and elsewhere Sensitive, need for formal guarantees Inductive Method: protocol verification through theorem proving + mathematical induction Toolbox built with FOO as example protocol 23 / 37

Motivation Analysis of e-voting dominated by ProVerif automatic verifier Powerful, but sometimes limited Motivation to fill in the gaps with complementary, alternative approach 24 / 37

Related Work Ryan / Kremer / Delaune: applied pi calculus, partially mechanized through ProVerif Observational equivalence: traces in which two voters swap their votes are equivalent in a sense Parts of the proof done by hand 25 / 37

E-voting Protocols New properties : privacy, verifiability, coercion-resistance... Partially studied with applied pi calculus, but with little mechanisation Often require modelling new crypto primitives 26 / 37

E-voting protocols: properties Eligibility Fairness Privacy / Receipt freeness / Coercion resistance linkability concept (hard) Individual / Universal verifiability 27 / 37

The FOO Protocol Fujioka, Okamoto and Ohta, 1992 Two election officials, bit commitment, blind signatures Signed, blinded commitment on a vote 6 steps 28 / 37

Specifying Blind Signatures Directly in Message.thy limitation of operators interplay Solution: as part of inductive model [[evsb foo; Crypt (prisk V) BSBody analz (spies evsb); BSBody = Crypt b (Crypt c (Nonce N)); b symkeys; Key b analz (spies evsb)]] = Notes Spy (Crypt (prisk V) (Crypt c (Nonce N))) # evsb foo 29 / 37

What Is Privacy in E-Voting? Crucial point: privacy is NOT confidentiality of vote...... But unlinkability of voter and vote In Pro-Verif, done with observational equivalence between swapped votes 30 / 37

Privacy in the Inductive Method: aanalz Extract associations from honest agent s messages 31 / 37

Privacy in the Inductive Method: asynth inductive set asynth :: msg set set msg set set for as :: msg set set where asynth Build [intro]: [[a1 as; a2 as; m a1; m a2; m Agent Adm; m Agent Col]] = a1 a2 asynth as Build up association sets from associations with common elements. Only pairwise so far! 32 / 37

Privacy in the Inductive Method: Theorem Statement theorem foo V privacy asynth: [[Says V Adm { Agent V, Crypt (prisk V) (Crypt b (Crypt c (Nonce Nv))) } set evs; a (asynth (aanalz Spy evs)); Nonce Nv a; V / bad; V Adm; V Col; evs foo]] = Agent V a If a regular voter started the protocol, the corresponding vote and identity are unlinkable. 33 / 37

Privacy in the Inductive Method: Proving Process Genericity of steps 2 and 4 yields proof complexity Genericity is natural consequence of respecting guarantee availability Strategy: map components in asynth to possible origins in aanalz Taxonomy of structures of elements in aanalz Divide & conquer 34 / 37

Contributions Conference publications: Holistic Analysis of Mix Protocols International Conference on Information Assurance and Security (IAS 2011) Verifying Privacy by Little Interaction and No Process Equivalence International Conference on Security and Cryptography (SECRYPT 2012) Workshop talk: Electronic Voting Protocol Analysis with the Inductive Method 2011 miniworkshop on Security Frameworks (mwsf11) 35 / 37

Conclusions Flexibility of Inductive Method confirmed...... but limitations related to message datatype extension Very different approach from most used tools (ProVerif, Scyther)...... hence potential for complementarity! 36 / 37

Future Work Focus on the e-voting part of the work Need stronger association synthesis proof complexity challenge Analyse more recent e-voting protocols Article on AIBS chapter Long-term goal: reengineer message datatype completely for broader primitive support 37 / 37