User Tools

Site Tools


Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation (BibTeX)

@INPROCEEDINGS{KuestersTruderung-CSF-2009,
  author = {Ralf K{\"u}sters and Tomasz Truderung},
  title = {{Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation}},
  booktitle = {Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF 2009)},
  year = 2009,
  publisher = {IEEE Computer Society},
  pages = {157--171},
  bib2html_impl_zip = {kuesterstruderung-dhproverif-2009.zip},
  abstract = {ProVerif is one of the most successful tools for cryptographic protocol analysis. However, dealing with algebraic properties of operators such as the exclusive OR (XOR) and Diffie-Hellman exponentiation has been problematic. Recently, we have developed an approach which enables ProVerif, and related tools, to analyze a large class of protocols that employ the XOR operator. In this work, we adapt this approach to the case of Diffie-Hellman exponentiation.  The core of our approach is to reduce the derivation problem for Horn theories modulo algebraic properties of Diffie-Hellman exponentiation to a purely syntactical derivation problem for Horn theories. The latter problem can then be solved by tools such as ProVerif.  Our reduction works for a large class of Horn theories, allowing to model a wide range of intruder capabilities and protocols.  We implemented our reduction and, in combination with ProVerif, applied it in the automatic analysis of several state-of-the-art protocols that use Diffie-Hellman exponentiation.   While the general idea of our approach follows the one for XOR in our previous work, the reduction itself and the proof of soundness and completeness of our reduction are entirely different from the XOR case. Surprisingly, the reduction for Diffie-Hellman exponentiation is more efficient than the one for XOR.}
}