Pretražite po imenu i prezimenu autora, mentora, urednika, prevoditelja

Napredna pretraga

Pregled bibliografske jedinice broj: 1100849

A Comprehensive Symbolic Analysis of TLS 1.3


Cremers, Cas; Horvat, Marko; Hoyland, Jonathan; Scott, Sam; van der Merwe, Thyla
A Comprehensive Symbolic Analysis of TLS 1.3 // CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
New York (NY): Association for Computing Machinery (ACM), 2017. str. 1773-1788 doi:10.1145/3133956.3134063 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni)


CROSBI ID: 1100849 Za ispravke kontaktirajte CROSBI podršku putem web obrasca

Naslov
A Comprehensive Symbolic Analysis of TLS 1.3

Autori
Cremers, Cas ; Horvat, Marko ; Hoyland, Jonathan ; Scott, Sam ; van der Merwe, Thyla

Vrsta, podvrsta i kategorija rada
Radovi u zbornicima skupova, cjeloviti rad (in extenso), znanstveni

Izvornik
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security / - New York (NY) : Association for Computing Machinery (ACM), 2017, 1773-1788

ISBN
978-1-4503-4946-8

Skup
2017 ACM SIGSAC Conference on Computer and Communications Security

Mjesto i datum
Dallas (TX), Sjedinjene Američke Države, 30.10.2017. - 03.11.2017

Vrsta sudjelovanja
Predavanje

Vrsta recenzije
Međunarodna recenzija

Ključne riječi
symbolic verification ; authenticated key exchange ; TLS 1.3

Sažetak
The TLS protocol is intended to enable secure end-to-end communication over insecure networks, including the Internet. Unfortunately, this goal has been thwarted a number of times throughout the protocol’s tumultuous lifetime, resulting in the need for a new version of the protocol, namely TLS 1.3. Over the past three years, in an unprecedented joint design effort with the academic community, the TLS Working Group has been working tirelessly to enhance the security of TLS.We further this effort by constructing the most comprehensive, faithful, and modular symbolic model of the TLS 1.3 draft 21 release candidate, and use the Tamarin prover to verify the claimed TLS 1.3 security requirements, as laid out in draft 21 of the specification. In particular, our model covers all handshake modes of TLS 1.3. Our analysis reveals an unexpected behaviour, which we expect will inhibit strong authentication guarantees in some implementations of the protocol. In contrast to previous models, we providea novel way of making the relation between the TLS specification and our model explicit: we provide a fully annotated version of the specification that clarifies what protocol elements we modelled, and precisely how we modelled these elements. We anticipate this model artifact to be of great benefit to the academic community and the TLS Working Group alike.

Izvorni jezik
Engleski

Znanstvena područja
Matematika, Računarstvo



POVEZANOST RADA


Ustanove:
Prirodoslovno-matematički fakultet, Matematički odjel, Zagreb,
Prirodoslovno-matematički fakultet, Zagreb

Profili:

Avatar Url Marko Horvat (autor)

Poveznice na cjeloviti tekst rada:

doi doi.org dl.acm.org

Citiraj ovu publikaciju:

Cremers, Cas; Horvat, Marko; Hoyland, Jonathan; Scott, Sam; van der Merwe, Thyla
A Comprehensive Symbolic Analysis of TLS 1.3 // CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
New York (NY): Association for Computing Machinery (ACM), 2017. str. 1773-1788 doi:10.1145/3133956.3134063 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni)
Cremers, C., Horvat, M., Hoyland, J., Scott, S. & van der Merwe, T. (2017) A Comprehensive Symbolic Analysis of TLS 1.3. U: CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security doi:10.1145/3133956.3134063.
@article{article, author = {Cremers, Cas and Horvat, Marko and Hoyland, Jonathan and Scott, Sam and van der Merwe, Thyla}, year = {2017}, pages = {1773-1788}, DOI = {10.1145/3133956.3134063}, keywords = {symbolic verification, authenticated key exchange, TLS 1.3}, doi = {10.1145/3133956.3134063}, isbn = {978-1-4503-4946-8}, title = {A Comprehensive Symbolic Analysis of TLS 1.3}, keyword = {symbolic verification, authenticated key exchange, TLS 1.3}, publisher = {Association for Computing Machinery (ACM)}, publisherplace = {Dallas (TX), Sjedinjene Ameri\v{c}ke Dr\v{z}ave} }
@article{article, author = {Cremers, Cas and Horvat, Marko and Hoyland, Jonathan and Scott, Sam and van der Merwe, Thyla}, year = {2017}, pages = {1773-1788}, DOI = {10.1145/3133956.3134063}, keywords = {symbolic verification, authenticated key exchange, TLS 1.3}, doi = {10.1145/3133956.3134063}, isbn = {978-1-4503-4946-8}, title = {A Comprehensive Symbolic Analysis of TLS 1.3}, keyword = {symbolic verification, authenticated key exchange, TLS 1.3}, publisher = {Association for Computing Machinery (ACM)}, publisherplace = {Dallas (TX), Sjedinjene Ameri\v{c}ke Dr\v{z}ave} }

Citati:





    Contrast
    Increase Font
    Decrease Font
    Dyslexic Font