Back to Search Start Over

How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment

Authors :
Blazy, Olivier
Boureanu, Ioana
Lafourcade, Pascal
Onete, Cristina
Robert, Léo
Blazy, Olivier
École polytechnique (X)
Geometry, arithmetic, algorithms, codes and encryption (GRACE)
Laboratoire d'informatique de l'École polytechnique [Palaiseau] (LIX)
École polytechnique (X)-Centre National de la Recherche Scientifique (CNRS)-École polytechnique (X)-Centre National de la Recherche Scientifique (CNRS)-Inria Saclay - Ile de France
Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)
University of Surrey (UNIS)
Université Clermont Auvergne (UCA)
XLIM (XLIM)
Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS)
Robert, Léo
École polytechnique (X)-Centre National de la Recherche Scientifique (CNRS)
Laboratoire d'Informatique, de Modélisation et d'Optimisation des Systèmes (LIMOS)
Ecole Nationale Supérieure des Mines de St Etienne (ENSM ST-ETIENNE)-Centre National de la Recherche Scientifique (CNRS)-Université Clermont Auvergne (UCA)-Institut national polytechnique Clermont Auvergne (INP Clermont Auvergne)
Université Clermont Auvergne (UCA)-Université Clermont Auvergne (UCA)
Source :
USENIX 2023-The 32nd USENIX Security Symposium, USENIX 2023-The 32nd USENIX Security Symposium, Aug 2023, Anaheim, United States, Usenix Security Symposium, Usenix Security Symposium, Aug 2023, Anaheim, United States
Publication Year :
2023
Publisher :
HAL CCSD, 2023.

Abstract

International audience; Post-Compromise Security (PCS) is a property of secure channel establishment schemes, which limits the security breach of an adversary that has compromised one of the end point to a certain number of messages, after which the channel heals. An attractive property, especially in view of Snowden's revelation of mass-surveillance, PCS was pioneered by the Signal messaging protocol, and is present in OTR. In this paper, we introduce a framework for quantifying and comparing PCS security, with respect to a broad taxonomy of adversaries. The generality and flexibility of our approach allows us to model the healing speed of a broad class of protocols, including Signal, but also an identity-based messaging protocol named SAID, and even a composition of 5G handover protocols.

Details

Language :
English
Database :
OpenAIRE
Journal :
USENIX 2023-The 32nd USENIX Security Symposium, USENIX 2023-The 32nd USENIX Security Symposium, Aug 2023, Anaheim, United States, Usenix Security Symposium, Usenix Security Symposium, Aug 2023, Anaheim, United States
Accession number :
edsair.dedup.wf.001..8ea81d9713dd4041e1b5d5f8b9bcf224