Relating Symbolic and Cryptographic Secrecy

M. Backes ; B. Pfitzmann IBM (United States)

Abstract

We investigate the relation between symbolic and cryptographic secrecy properties for cryptographic protocols. Symbolic secrecy of payload messages or exchanged keys is arguably the most important notion of secrecy shown with automated proof tools. It means that an adversary restricted to symbolic operations on terms can never get the entire considered object into its knowledge set. Cryptographic secrecy essentially means computational indistinguishability between the real object and a random one, given the view of a much more general adversary. In spite of recent advances in linking symbolic and computational models of cryptography, no relation for secrecy under active attacks is known yet. For exchanged keys, we show that a certain strict symbolic secrecy definition over a specific Dolev-Yao-style cryptographic library implies cryptographic key secrecy for a real implementation of this cryptographic library. For payload messages, we present the first general cryptographic secrecy definition for a reactive scenario. The main challenge is to separate secrecy violations by the protocol under consideration from secrecy violations by the protocol users in a general way. For this definition, we show a general secrecy preservation theorem under reactive simulatability, the cryptographic notion of secure implementation. This theorem is of independent cryptographic interest. We then show that symbolic secrecy implies cryptographic payload secrecy for the same cryptographic library as used in key secrecy. Our results thus enable formal proof techniques to establish cryptographically sound proofs of secrecy for payload messages and exchanged keys.

Journal
IEEE Transactions on Professional Communication
Published
2005-02-01
DOI
10.1109/tdsc.2005.25
CompPile
Search in CompPile ↗
Open Access
Closed
Export

Citation Context

Cited by in this index (0)

No articles in this index cite this work.

Cites in this index (0)

No references match articles in this index.

Also cites 32 works outside this index ↓
  1. 10.1109/TIT.1983.1056650
  2. 10.1109/SFCS.1983.42
  3. 10.1007/0-387-28835-x_11
  4. 10.1109/SP.1984.10003
  5. 10.1109/SECPRI.1989.36288
  6. 10.1007/BF00197942
  7. 10.1109/SECPRI.1996.502680
  8. 10.1145/266420.266432
  9. 10.1007/3-540-61042-1_43
  10. 10.3233/JCS-1998-61-205
  11. 10.1007/3-540-44929-9_1
  12. 10.1007/3-540-45500-0_4
  13. 10.1007/3-540-45309-1_6
  14. 10.1007/978-3-540-45146-4_32
  15. 10.1145/948109.948140
  16. 10.1007/978-3-540-39650-5_16
  17. 10.1109/CSFW.2004.1310742
  18. 10.1007/3-540-36494-3_59
  19. 10.1007/s10207-004-0039-7
  20. 10.1109/CSFW.2002.1021814
  21. 10.1007/978-3-540-24597-1_1
  22. 10.1007/978-3-540-30108-0_6
  23. 10.1109/SECPRI.2004.1301316
  24. 10.1007/978-3-540-24638-1_8
  25. 10.1109/SECPRI.2004.1301317
  26. 10.1016/0022-0000(84)90070-9
  27. 10.1007/0-387-33406-8_20
  28. 10.1109/CSFW.1997.596779
  29. 10.1109/SFCS.1982.45
  30. 10.1109/SECPRI.2001.924298
  31. 10.1007/978-3-540-24638-1_19
  32. 10.1145/288090.288117