Title
Decidability for Lightweight Diffie-Hellman Protocols
Abstract
Many protocols use Diffie-Hellman key agreement, combined with certified long-term values or digital signatures for authentication. These protocols aim at security goals such as key secrecy, forward secrecy, resistance to key compromise attacks, and various flavors of authentication. However, these protocols are challenging to analyze, both in computational and symbolic models. An obstacle in the symbolic model is the undecidability of unification in many theories in the signature of rings. In this paper, we develop an algebraic version of the symbolic approach, working directly within finite fields, the natural structures for the protocols. The adversary, in giving an attack on a protocol goal in a finite field, may rely on any identity in that field. He defeats the protocol if there are attacks in infinitely many finite fields. We prove that, even for this strong adversary, security goals for a wide class of protocols are decidable.
Year
DOI
Venue
2014
10.1109/CSF.2014.23
Computer Security Foundations Symposium
Keywords
Field
DocType
security protocols, diffie-hellman, decidability, strand spaces,computational modeling,authentication,forward secrecy,digital signatures,decidability,computational models,diffie hellman,cryptographic protocols,security protocols,finite fields,algebra,protocols
Authentication,Cryptographic protocol,Computer security,Computer science,Secrecy,Decidability,Theoretical computer science,Digital signature,Forward secrecy,Adversary,Diffie–Hellman key exchange
Conference
ISSN
Citations 
PageRank 
1063-6900
7
0.45
References 
Authors
30
2
Name
Order
Citations
PageRank
Daniel J. Dougherty141332.13
Joshua D. Guttman21577115.55