[cryptography] Validating cryptographic protocols

2013-05-01 Thread Florian Weimer
I've recently been asked to comment on a key exchange protocol which uses symmetric cryptography and a mutually trusted third party. The obvious recommendation is to copy the Kerberos protocol (perhaps with updated cryptographic primitives), but let's assume that's not feasible for some reason.

Re: [cryptography] Validating cryptographic protocols

2013-05-01 Thread Alfonso De Gregorio
On Wed, May 1, 2013 at 6:50 PM, Florian Weimer f...@deneb.enyo.de wrote: I'm wondering what's the state of the art here, and if there are any formal methods for deciding if a particular protocol has certain security properties. I know that there have been some advances in this area, but it's

Re: [cryptography] Validating cryptographic protocols

2013-05-01 Thread Ralph Holz
The state of the art is represented by: - ProVerif (represent protocols by Horn clauses and analyzes them doing over-approximation) http://prosecco.gforge.inria.fr/personal/bblanche/proverif/ - Scyther (symbolic backwards search) http://people.inf.ethz.ch/cremersc/scyther/index.html -

Re: [cryptography] Validating cryptographic protocols

2013-05-01 Thread Nico Williams
On Wed, May 1, 2013 at 9:50 AM, Florian Weimer f...@deneb.enyo.de wrote: I've recently been asked to comment on a key exchange protocol which uses symmetric cryptography and a mutually trusted third party. The obvious recommendation is to copy the Kerberos protocol (perhaps with updated

Re: [cryptography] Validating cryptographic protocols

2013-05-01 Thread Jeffrey Altman
On 5/1/2013 10:50 AM, Florian Weimer wrote: (This assumes that the primitives are themselves secure, and that leakage from improper implementation of the primitives can be contained in some way, e.g. no padding oracles.) It is worth noting that the Kerberos crypto primitives were extracted

Re: [cryptography] Validating cryptographic protocols

2013-05-01 Thread Nico Williams
To complete the thought I meant to... don't just copy Kerberos. Copy the fixes, and fold them in better. Regarding crypto primitives, as Jeff Altman points out, the Kerberos ones have been separated out from Kerberos. See RFC 3961 and 3962. Note that for AES in particular Kerberos relies on