Searching for Selfie in TLS 1.3 with the Cryptographic Protocol Shapes Analyzer

dc.contributor.authorBhandary, Prajna
dc.contributor.authorZieglar, Edward
dc.contributor.authorNicholas, Charles
dc.date.accessioned2022-01-06T16:17:46Z
dc.date.available2022-01-06T16:17:46Z
dc.date.issued2021-11-19
dc.description.abstractTLS 1.3 was developed in conjunction with several formal analyses and proofs of its security properties. However, in 2019, researchers Drucker and Gueron discovered a reflection attack, they named Selfie, against the pre-shared key (PSK) mode of authentication used by TLS 1.3 by identifying a gap in the proofs. They realized that the proofs ignored the case of external PSKs. They demonstrated that if the PSK was not associated with a particular client and server pairing, such as a single PSK between a pair of hosts which could use the key as either a client or server, implicit authentication implied by the use of the PSK would fail in a reflection attack. The proofs and tools used did not account for this, so we set out to determine if it was possible to identify this attack with the Cryptographic Protocol Shapes Analyzer (CPSA). Using CPSA, which attempts to enumerate all equivalence classes of a protocol’s executions, we were able to uncover the attack and verify two proposed mitigations. We were also able to identify a previously discovered impersonation attack against the use of post handshake authentication in scenarios where a PSK is used as a network keyen_US
dc.description.urihttps://link.springer.com/chapter/10.1007/978-3-030-91631-2_3en_US
dc.format.extent27 pagesen_US
dc.genrebook chaptersen_US
dc.identifierdoi:10.13016/m2rhxw-bcvx
dc.identifier.citationBhandary P., Zieglar E., Nicholas C. (2021) Searching for Selfie in TLS 1.3 with the Cryptographic Protocol Shapes Analyzer. In: Dougherty D., Meseguer J., Mödersheim S.A., Rowe P. (eds) Protocols, Strands, and Logic. Lecture Notes in Computer Science, vol 13066. Springer, Cham. https://doi.org/10.1007/978-3-030-91631-2_3en_US
dc.identifier.urihttps://doi.org/10.1007/978-3-030-91631-2_3
dc.identifier.urihttp://hdl.handle.net/11603/23860
dc.language.isoen_USen_US
dc.publisherSpringeren_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofUMBC Staff Collection
dc.rightsThis work was written as part of one of the author's official duties as an Employee of the United States Government and is therefore a work of the United States Government. In accordance with 17 U.S.C. 105, no copyright protection is available for such works under U.S. Law.en_US
dc.rightsPublic Domain Mark 1.0*
dc.rights.urihttps://creativecommons.org/publicdomain/mark/1.0/*
dc.titleSearching for Selfie in TLS 1.3 with the Cryptographic Protocol Shapes Analyzeren_US
dc.typeTexten_US
dcterms.creatorhttps://orcid.org/0000-0001-9494-7139en_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Searching for Selfies.pdf
Size:
5.8 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: