• DocumentCode
    939313
  • Title

    Relating symbolic and cryptographic secrecy

  • Author

    Backes, Michael ; Pfitzmann, Birgit

  • Author_Institution
    IBM Zurich Res. Lab, Rueschlikon, Switzerland
  • Volume
    2
  • Issue
    2
  • fYear
    2005
  • Firstpage
    109
  • Lastpage
    123
  • Abstract
    We investigate the relation between symbolic and cryptographic secrecy properties for cryptographic protocols. Symbolic secrecy of payload messages or exchanged keys is arguably the most important notion of secrecy shown with automated proof tools. It means that an adversary restricted to symbolic operations on terms can never get the entire considered object into its knowledge set. Cryptographic secrecy essentially means computational indistinguishability between the real object and a random one, given the view of a much more general adversary. In spite of recent advances in linking symbolic and computational models of cryptography, no relation for secrecy under active attacks is known yet. For exchanged keys, we show that a certain strict symbolic secrecy definition over a specific Dolev-Yao-style cryptographic library implies cryptographic key secrecy for a real implementation of this cryptographic library. For payload messages, we present the first general cryptographic secrecy definition for a reactive scenario. The main challenge is to separate secrecy violations by the protocol under consideration from secrecy violations by the protocol users in a general way. For this definition, we show a general secrecy preservation theorem under reactive simulatability, the cryptographic notion of secure implementation. This theorem is of independent cryptographic interest. We then show that symbolic secrecy implies cryptographic payload secrecy for the same cryptographic library as used in key secrecy. Our results thus enable formal proof techniques to establish cryptographically sound proofs of secrecy for payload messages and exchanged keys.
  • Keywords
    cryptography; Dolev-Yao-style cryptographic library; automated proof tools; cryptographic key secrecy; cryptographic payload secrecy; cryptographic protocols; cryptographic secrecy; exchanged keys secrecy; payload messages secrecy; secrecy preservation theorem; symbolic secrecy; Algebra; Computational modeling; Cryptographic protocols; Cryptography; Equations; Humans; Joining processes; Libraries; Payloads; Public key; Dolev-Yao model; Index Terms- Relations between models; probabilistic computation—cryptography; secrecy; simulatability.;
  • fLanguage
    English
  • Journal_Title
    Dependable and Secure Computing, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1545-5971
  • Type

    jour

  • DOI
    10.1109/TDSC.2005.25
  • Filename
    1453530