DocumentCode
3673833
Title
Secrecy by witness-functions under equational theories
Author
Jaouhar Fattahi;Mohamed Mejri
Author_Institution
Dept. of Comput. Sci. &
fYear
2015
fDate
6/1/2015 12:00:00 AM
Firstpage
1
Lastpage
8
Abstract
In this paper, we use the witness-functions to analyze cryptographic protocols for secrecy under nonempty equational theories. The witness-functions are safe metrics used to compute security. An analysis with a witness-function consists in making sure that the security of every atomic message does not decrease during its lifecycle in the protocol. The analysis gets more difficult under nonempty equational theories. Indeed, the intruder can take advantage of the algebraic properties of the cryptographic primitives to derive secrets. These properties arise from the use of mathematical functions, such as multiplication, addition, exclusive-or or modular exponentiation in the cryptosystems and the protocols. Here, we show how to use the witness-functions under nonempty equational theories and we run an analysis on the Needham-Schroeder-Lowe protocol under the cipher homomorphism. This analysis reveals that although this protocol is proved secure under the perfect encryption assumption, its security collapses under the homomorphic primitives. We show how the witness-functions help to illustrate an attack scenario on it and we propose an amended version to fix it.
Keywords
"Protocols","Context","Encryption","Measurement","Lattices"
Publisher
ieee
Conference_Titel
Electronics, Computers and Artificial Intelligence (ECAI), 2015 7th International Conference on
Print_ISBN
978-1-4673-6646-5
Type
conf
DOI
10.1109/ECAI.2015.7301205
Filename
7301205
Link To Document