TUHH Open Research
Help
  • Log In
    New user? Click here to register.Have you forgotten your password?
  • English
  • Deutsch
  • Communities & Collections
  • Publications
  • Research Data
  • People
  • Institutions
  • Projects
  • Statistics
  1. Home
  2. TUHH
  3. Publication References
  4. Downgrade Resilience in Key-Exchange Protocols
 
Options

Downgrade Resilience in Key-Exchange Protocols

Publikationstyp
Conference Paper
Date Issued
2016-08-16
Sprache
English
Author(s)
Bhargavan, Karthikeyan  
Brzuska, Chris  
Fournet, Cedric  
Green, Matthew  
Kohlweiss, Markulf  
Zanella-Beguelin, Santiago  
Institut
Mehrskalensimulation von Feststoffsystemen V-EXK1  
TORE-URI
http://hdl.handle.net/11420/6180
Start Page
506
End Page
525
Article Number
7546520
Citation
IEEE Symposium on Security and Privacy, SP: 7546520 (2016-08-16)
Contribution to Conference
Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016  
Publisher DOI
10.1109/SP.2016.37
Scopus ID
2-s2.0-84987664765
ISBN of container
978-150900824-7
Key-exchange protocols such as TLS, SSH, IPsec, and ZRTP are highly configurable, with typical deployments supporting multiple protocol versions, cryptographic algorithms and parameters. In the first messages of the protocol, the peers negotiate one specific combination: the protocol mode, based on their local configurations. With few notable exceptions, most cryptographic analyses of configurable protocols consider a single mode at a time. In contrast, downgrade attacks, where a network adversary forces peers to use a mode weaker than the one they would normally negotiate, are a recurrent problem in practice. How to support configurability while at the same time guaranteeing the preferred mode is negotiated? We set to answer this question by designing a formal framework to study downgrade resilience and its relation to other security properties of key-exchange protocols. First, we study the causes of downgrade attacks by dissecting and classifying known and novel attacks against widely used protocols. Second, we survey what is known about the downgrade resilience of existing standards. Third, we combine these findings to define downgrade security, and analyze the conditions under which several protocols achieve it. Finally, we discuss patterns that guarantee downgrade security by design, and explain how to use them to strengthen the security of existing protocols, including a newly proposed draft of TLS 1.3.
Subjects
Cryptography
IKE
IPSec
Key Exchange
Protocols
Security
SSH
TLS
ZRTP
TUHH
Weiterführende Links
  • Contact
  • Send Feedback
  • Cookie settings
  • Privacy policy
  • Impress
DSpace Software

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science
Design by effective webwork GmbH

  • Deutsche NationalbibliothekDeutsche Nationalbibliothek
  • ORCiD Member OrganizationORCiD Member Organization
  • DataCiteDataCite
  • Re3DataRe3Data
  • OpenDOAROpenDOAR
  • OpenAireOpenAire
  • BASE Bielefeld Academic Search EngineBASE Bielefeld Academic Search Engine
Feedback