Information Security and Privacy
Volume 9144 of the series Lecture Notes in Computer Science pp 270-288
Modelling Ciphersuite and Version Negotiation in the TLS Protocol
- Benjamin DowlingAffiliated withQueensland University of Technology Email author
- , Douglas StebilaAffiliated withQueensland University of Technology
Abstract
Real-world cryptographic protocols such as the widely used Transport Layer Security (TLS) protocol support many different combinations of cryptographic algorithms (called ciphersuites) and simultaneously support different versions. Recent advances in provable security have shown that most modern TLS ciphersuites are secure authenticated and confidential channel establishment (ACCE) protocols, but these analyses generally focus on single ciphersuites in isolation. In this paper we extend the ACCE model to cover protocols with many different sub-protocols, capturing both multiple ciphersuites and multiple versions, and define a security notion for secure negotiation of the optimal sub-protocol. We give a generic theorem that shows how secure negotiation follows, with some additional conditions, from the authentication property of secure ACCE protocols. Using this framework, we analyse the security of ciphersuite and three variants of version negotiation in TLS, including a recently proposed mechanism for detecting fallback attacks.
Keywords
Transport layer security (tls) Ciphersuite negotiation Version negotiation Downgrade attacks Cryptographic protocols- Title
- Modelling Ciphersuite and Version Negotiation in the TLS Protocol
- Book Title
- Information Security and Privacy
- Book Subtitle
- 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings
- Pages
- pp 270-288
- Copyright
- 2015
- DOI
- 10.1007/978-3-319-19962-7_16
- Print ISBN
- 978-3-319-19961-0
- Online ISBN
- 978-3-319-19962-7
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- 9144
- Series ISSN
- 0302-9743
- Publisher
- Springer International Publishing
- Copyright Holder
- Springer International Publishing Switzerland
- Additional Links
- Topics
- Keywords
-
- Transport layer security (tls)
- Ciphersuite negotiation
- Version negotiation
- Downgrade attacks
- Cryptographic protocols
- Industry Sectors
- eBook Packages
- Editors
-
-
Ernest Foo
(13)
-
Douglas Stebila
(14)
-
Ernest Foo
- Editor Affiliations
-
- 13. Queensland University of Technology
- 14. Queensland University of Technology
- Authors
-
-
Benjamin Dowling
(15)
-
Douglas Stebila
(15)
-
Benjamin Dowling
- Author Affiliations
-
- 15. Queensland University of Technology, Brisbane, Australia
Continue reading...
To view the rest of this content please follow the download PDF link above.