Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication

2016 IEEE Symposium on Security and Privacy (SP)(2016)

引用 142|浏览145
暂无评分
摘要
After a development process of many months, the TLS 1.3 specification is nearly complete. To prevent past mistakes, this crucial security protocol must be thoroughly scrutinised prior to deployment. In this work we model and analyse revision 10 of the TLS 1.3 specification using the Tamarin prover, a tool for the automated analysis of security protocols. We specify and analyse the interaction of various handshake modes for an unbounded number of concurrent TLS sessions. We show that revision 10 meets the goals of authenticated key exchange in both the unilateral and mutual authentication cases. We extend our model to incorporate the desired delayed client authentication mechanism, a feature that is likely to be included in the next revision of the specification, and uncover a potential attack in which an adversary is able to successfully impersonate a client during a PSK-resumption handshake. This observation was reported to, and confirmed by, the IETF TLS Working Group. Our work not only provides the first supporting evidence for the security of several complex protocol mode interactions in TLS 1.3, but also shows the strict necessity of recent suggestions to include more information in the protocol's signature contents.
更多
查看译文
关键词
TLS 1.3 verification,0-RTT mechanism,TLS 1.3 specification,security protocol,Tamarin prover,automated analysis,handshake modes,concurrent TLS sessions,authenticated key exchange,unilateral authentication,mutual authentication,delayed client authentication,PSK-resumption handshake,IETF TLS Working Group,complex protocol mode interactions,signature contents
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要