Publication | Closed Access
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
113
Citations
15
References
2015
Year
Unknown Venue
Previous Tls VersionsCryptographic AnalysisEngineeringCryptographic PrimitiveInformation SecurityCryptographic TechnologyCryptographic ProtocolFormal VerificationTls 1.3Hardware SecurityPublic Key AlgorithmInternet Of ThingsSecure ProtocolAuthentication ProtocolTransport Layer SecurityLightweight CryptographyComputer ScienceData SecurityCryptographyFormal Methods
The Internet Engineering Task Force (IETF) is currently developing the next version of the Transport Layer Security (TLS) protocol, version 1.3. The transparency of this standardization process allows comprehensive cryptographic analysis of the protocols prior to adoption, whereas previous TLS versions have been scrutinized in the cryptographic literature only after standardization. This is even more important as there are two related, yet slightly different, candidates in discussion for TLS 1.3, called draft-ietf-tls-tls13-05 and draft-ietf-tls-tls13-dh-based. We give a cryptographic analysis of the primary ephemeral Diffie-Hellman-based handshake protocol, which authenticates parties and establishes encryption keys, of both TLS 1.3 candidates. We show that both candidate handshakes achieve the main goal of providing secure authenticated key exchange according to an augmented multi-stage version of the Bellare-Rogaway model. Such a multi-stage approach is convenient for analyzing the design of the candidates, as they establish multiple session keys during the exchange.
| Year | Citations | |
|---|---|---|
Page 1
Page 1