skip to main content
article
Free Access

Inductive analysis of the Internet protocol TLS

Published:01 August 1999Publication History
Skip Abstract Section

Abstract

Internet browsers use security protocols to protect sensitive messages. An inductive analysis of TLS (a descendant of SSL 3.0) has been performed using the theorem prover Isabelle. Proofs are based on higher-order logic and make no assumptions concerning beliefs of finiteness. All the obvious security goals can be proved; session resumption appears to be secure even if old session keys are compromised. The proofs suggest minor changes to simplify the analysis.

TLS, even at an abstract level, is much more complicated than most protocols verified by researchers. Session keys are negotiated rather than distributed, and the protocol has many optional parts. Netherless, the resources needed to verify TLS are modest: six man-weeks of effort and three minutes of processor time.

References

  1. ABADI, M. AND NEEDHAM, R. 1996. Prudent engineering practice for cryptographic protocols. IEEE Trans. Softw. Eng. 22, I, 6-15. Google ScholarGoogle Scholar
  2. BELLA, G. AND PAULSON, L. C. 1998. Kerberos version IV: Inductive analysis of the secrecy goals. In Computer Security (ESORICS '98), J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, Eds. Springer-Verlag, New York, 361-375. Google ScholarGoogle Scholar
  3. DIERKS, T. AND ALLEN, C. 1999. The TLS protocol: Version 1.0. Request for Comments: 2246. ftp ://ftp.isi. edu/in-notes/rfc2246.txt. Google ScholarGoogle Scholar
  4. DIETRICH, S. 1997. A formal analysis of the secure sockets layer protocol. Ph.D. Dissertation. Adelphi Univ., Garden City, NY.Google ScholarGoogle Scholar
  5. FREIER, A. O., KARLTON, P., AND KOCHER, P. C. 1996. The SSL protocol version 3.0. Internet-draft draft-freier-ssl-version3-02.txtGoogle ScholarGoogle Scholar
  6. GOLLMANN, D. 1996. What do we mean by entity authentication?. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, CA, May). IEEE Press, Piscataway, NJ, 46 -54. Google ScholarGoogle Scholar
  7. MITCHELL, J. C., SHMATIKOV, V., AND STERN, U. 1997. Finite-state analysis of SSL 3.0 and related protocols. In Proceedings of the Workshop on Design and Formal Verification of Security Protocols (DIMACS, Sept.), H. Orman and C. Meadows, Eds. Google ScholarGoogle Scholar
  8. PAULSON, L. C. 1994. Isabelle: A generic theorem prover. In Lecture Notes in Computer Science. Lecture Notes in Computer Science, vol. 828. Springer-Verlag, New York.Google ScholarGoogle Scholar
  9. PAULSON, L. C. 1999. Relations between secrets: Two formal analyses of the Yahalom protocol. J. Comput. Secur. 7 (To appear). Google ScholarGoogle Scholar
  10. PAULSON, L. C. 1998. The inductive approach to verifying cryptographic protocols. J. Comput. Secur. 6, 85-128. Google ScholarGoogle Scholar
  11. RYAN, P. Y. A. AND SCHNEIDER, S.A. 1998. An attack on a recursive authentication protocol. A cautionary tale. Inf. Process. Lett. 65, 1, 7-10. Google ScholarGoogle Scholar
  12. WAGNER, D. AND SCHNEIER, B. 1996. Analysis of the SSL 3.0 protocol. In Proceedings of the USENIX Conference on Electronic Commerce. USENIX Assoc., Berkeley, CA, 29-40. Google ScholarGoogle Scholar

Index Terms

  1. Inductive analysis of the Internet protocol TLS

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Information and System Security
        ACM Transactions on Information and System Security  Volume 2, Issue 3
        Aug. 1999
        122 pages
        ISSN:1094-9224
        EISSN:1557-7406
        DOI:10.1145/322510
        Issue’s Table of Contents

        Copyright © 1999 ACM

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 August 1999
        Published in tissec Volume 2, Issue 3

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader