2014
DOI: 10.1007/978-3-662-44381-1_14
|View full text |Cite
|
Sign up to set email alerts
|

Proving the TLS Handshake Secure (As It Is)

Abstract: The TLS Internet Standard features a mixed bag of cryptographic algorithms and constructions, letting clients and servers negotiate their use for each run of the handshake. Although many ciphersuites are now well-understood in isolation, their composition remains problematic, and yet it is critical to obtain practical security guarantees for TLS. We experimentally confirm that all mainstream implementations of TLS share key materials between different algorithms, some of them of dubious strength. We outline at… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
42
0
1

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 60 publications
(43 citation statements)
references
References 41 publications
0
42
0
1
Order By: Relevance
“…On the other hand, our paper does not challenge the cryptographic security of the core constructions of TLS-most of our attacks apply even under the (theoretical) assumption that clients and servers only use cryptographically strong ciphersuites, as formalized, for example, in [15,35,29,16]. I-B NEW ATTACKS OVER TLS.…”
Section: Transparent Transport Layer Security?mentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, our paper does not challenge the cryptographic security of the core constructions of TLS-most of our attacks apply even under the (theoretical) assumption that clients and servers only use cryptographically strong ciphersuites, as formalized, for example, in [15,35,29,16]. I-B NEW ATTACKS OVER TLS.…”
Section: Transparent Transport Layer Security?mentioning
confidence: 99%
“…To validate them experimentally, we implemented and tested patches for two existing TLS implementations: OpenSSL and miTLS. As future work, we plan to formally model their security benefits by extending the verified cryptographic model of miTLS [15,16]. Simple Verified HTTPS over TLS ( §VIII) In principle, carefully-written applications can defend against these attacks, without the need to change TLS.…”
Section: Transparent Transport Layer Security?mentioning
confidence: 99%
“…In view of its importance, TLS has long been the subject of intense research analysis and attacks, including, in chronological order, [56,17,52,39,36,55,23,37,5,49,33,6,50,28,51,11,2,34,48,29,19,48,3,12,4,13,10]. Particular attention has been given in recent works to the analysis of TLS 1.2, starting with variants of the protocol in [36,50], to the cryptographic core in [34,43,31,45] and then a more complete specification [14]. The recent QUIC protocol from Google by Langley and Chang [44], designed to add support to the 0-RTT setting, has also been the subject of formal analysis by Fischlin and Günther [30] and by Lychev et al [46].…”
Section: Introductionmentioning
confidence: 99%
“…This has become an active field of research in the last few years (see, e.g., [25], [27], [28], [29], [30], [31] for some of the recent works). More specifically, we use the CVJ framework (cryptographic verification of Java programs) proposed by Küsters, Truderung, and Graf [25] for this purpose.…”
Section: Introductionmentioning
confidence: 99%