SlideShare a Scribd company logo
On	the	Security	of	TLS-DHE	in	the	
Standard	Model	
Tibor	Jager,	Florian	Kohlar,	Sven	Schäge,	and	Jörg	Schwenk	
	
Horst	Görtz	Ins,tute	for	IT	Security,	Bochum	
	
	
1st	BIU	Security	Day:	The	Current	Status	of	TLS	Security	
May	1,	2016	
Bar-Ilan	University,	Israel	
1
TLS	and	SSL	Versions	
2	
SSL	1.0	and	2.0	
(Netscape)	
1994	 1995	
SSL	3.0	
(Netscape	&	MicrosoY	PCT)	
1999	
TLS	1.0	(=SSL	3.1)	
(IETF	standard)	
2006	 2008	
TLS	1.2	
TLS	1.1	
•  This	talk:	TLS	≈	TLS	1.0	≈	TLS	1.1	≈	TLS	1.2	
•  This	talk	is	not	about	TLS	1.3!	
2016?	
TLS	1.3
Support	of	TLS	versions	in	prac`ce	
3	
SSL	Labs,	haps://www.trustworthyinternet.org/ssl-pulse/,	Jan	5,	2016	
TLS	
v1.3	
(2016?)	(1999)	(1995)	(1994)	 (2006)	 (2008)	
Support	of	
more	than	one	version	
is	very	common
TLS	Sessions:	
Handshake	+	Record	Layer	
4	
1.	Handshake	
Handshake:	
•  Nego`a`on	of	cryptographic	
parameters	
(selec`on	of	Cipher	Suite)	
•  Authen7ca7on	
•  Establishment	of	session	key	k	
Client	 Server
TLS	Sessions:	
Handshake	+	Record	Layer	
5	
1.	Handshake	
2.	Record	Layer	
Handshake:	
•  Nego`a`on	of	cryptographic	
parameters	
(selec`on	of	Cipher	Suite)	
•  Authen7ca7on	
•  Establishment	of	session	key	k	
Record	Layer:	
•  Data	encryp7on	and	
authen7ca7on	using	key	k	
Client	 Server
Cipher	Suites	
•  Standardized	selec7on	of	algorithms	for	key	
exchange,	signature,	encryp`on,	hashing	
– TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA	
•  3	groups	of	Cipher	Suites:	
– Ephemeral	Diffie-Hellman	(TLS-DHE)	
– Sta`c	Diffie-Hellman	(TLS-DH)	
– RSA	encryp`on	(TLS-RSA)	
– Handshake	protocol	is	(slightly)	different	for	each	
group	
6
Cipher	Suites	
•  Standardized	selec7on	of	algorithms	for	key	
exchange,	signature,	encryp`on,	hashing	
– TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA	
•  3	families	of	Cipher	Suites:	
– Ephemeral	Diffie-Hellman	(TLS-DHE)	
– Sta`c	Diffie-Hellman	(TLS-DH)	
– RSA	encryp`on	(TLS-RSA)	
– Handshake	protocol	is	(slightly)	different	for	each	
group	
7
The	Cryptographic	Core	of	the		
TLS-DHE	Handshake	
8	
C	has	signature	
key	(pkC,	skC)	
S	has	signature	
key	(pkS,	skS)
The	Cryptographic	Core	of	the		
TLS-DHE	Handshake	
9	
C	has	signature	
key	(pkC,	skC)	
S	has	signature	
key	(pkS,	skS)	
rC,	supported	Cipher	Suites	
rS,	selected	Cipher	Suite	
1.	Cipher	suite	agreement:
The	Cryptographic	Core	of	the		
TLS-DHE	Handshake	
10	
C	has	signature	
key	(pkC,	skC)	
S	has	signature	
key	(pkS,	skS)	
rC,	supported	Cipher	Suites	
rS,	selected	Cipher	Suite	
1.	Cipher	suite	agreement:	
gs,	Sig(skS;	gs,	some	previous	data)	
gc,	Sig(skC;	gc,	some	previous	data)	
pms	=	gcs	
k	=	PRF(ms;L2,rC,rS)	
ms	=	PRF(pms;L1,rC,rS)	
pms	=	gcs	
k	=	PRF(ms;L2,rC,rS)	
ms	=	PRF(pms;L1,rC,rS)	
2.	Key	exchange:	
s	ß	Zq	
c	ß	Zq
The	Cryptographic	Core	of	the		
TLS-DHE	Handshake	
11	
C	has	signature	
key	(pkC,	skC)	
S	has	signature	
key	(pkS,	skS)	
rC,	supported	Cipher	Suites	
rS,	selected	Cipher	Suite	
1.	Cipher	suite	agreement:	
gs,	Sig(skS;	gs,	some	previous	data)	
gc,	Sig(skC;	gc,	some	previous	data)	
pms	=	gcs	
k	=	PRF(ms;L2,rC,rS)	
ms	=	PRF(pms;L1,rC,rS)	
pms	=	gcs	
k	=	PRF(ms;L2,rC,rS)	
ms	=	PRF(pms;L1,rC,rS)	
2.	Key	exchange:	
Enc(k;constS,	finS)	 finS	=	PRF(ms;	L3,prev.	data)	
finC	=	PRF(ms;	L4,prev.	data)	
“Accept”	key	k	
with	partner	S	
Enc(k;constC,	finC)	
3.	FINISHED	messages:	
“Accept”	key	k	
with	partner	C	
s	ß	Zq	
c	ß	Zq
The	Cryptographic	Core	of	the		
TLS-DHE	Handshake	
12	
C	has	signature	
key	(pkC,	skC)	
S	has	signature	
key	(pkS,	skS)	
rC,	supported	Cipher	Suites	
rS,	selected	Cipher	Suite	
1.	Cipher	suite	agreement:	
gs,	Sig(skS;	gs,	some	previous	data)	
gc,	Sig(skC;	gc,	some	previous	data)	
pms	=	gcs	
k	=	PRF(ms;L2,rC,rS)	
ms	=	PRF(pms;L1,rC,rS)	
pms	=	gcs	
k	=	PRF(ms;L2,rC,rS)	
ms	=	PRF(pms;L1,rC,rS)	
2.	Key	exchange:	
Enc(k;constS,	finS)	 finS	=	PRF(ms;	L3,prev.	data)	
finC	=	PRF(ms;	L4,prev.	data)	
“Accept”	key	k	
with	partner	S	
Enc(k;constC,	finC)	
3.	FINISHED	messages:	
Is	this	secure?	
“Accept”	key	k	
with	partner	C	
s	ß	Zq	
c	ß	Zq
Secure	Authen`cated	Key	Exchange	
•  Desired	proper`es:	
–  Authen7ca7on	of	communica`on	partners	
–  Good	cryptographic	keys	
•  Several	security	models	formalizing	this	no`on	
–  We	use	enhanced	version	of	Bellare-Rogaway	[BR’93]	
•  Adopted	to	the	public-key	sewng	
•  Cf.	Blake-Wilson	et	al.	[BJM’99]	
•  Model	described	by	two	components:	
–  Execu7on	model	
–  Security	defini7on	
13
Secure	Authen`cated	Key	Exchange	
•  Desired	proper`es:	
–  Authen7ca7on	of	communica`on	partners	
–  Good	cryptographic	keys	
•  Several	security	models	formalizing	this	no`on	
–  We	use	enhanced	version	of	Bellare-Rogaway	[BR’93]	
•  Adopted	to	the	public-key	sewng	
•  Cf.	Blake-Wilson	et	al.	[BJM’99]	
•  Model	described	by	two	components:	
–  Execu7on	model	
–  Security	defini7on	
14
Secure	Authen`cated	Key	Exchange	
•  Desired	proper`es:	
–  Authen7ca7on	of	communica`on	partners	
–  Good	cryptographic	keys	
•  Several	security	models	formalizing	this	no`on	
–  We	use	enhanced	version	of	Bellare-Rogaway	[BR’93]	
•  Adopted	to	the	public-key	sewng	
•  Cf.	Blake-Wilson	et	al.	[BJM’99]	
•  Model	described	by	two	components:	
–  Execu7on	model	
–  Security	defini7on	
15
Execu`on	Model	
16	
Protocol	Π	
C1	
(pkC1,skC1)	
C2	
(pkC2,skC2)	
C3	
(pkC3,skC3)	
S1	
(pkS1,skS1)	
S2	
(pkS2,skS2)	
S3	
(pkS3,skS3)
17	
Execu`on	Model	
C1	
(pkC1,skC1)	
C2	
(pkC2,skC2)	
C3	
(pkC3,skC3)	
S1	
(pkS1,skS1)	
S2	
(pkS2,skS2)	
S3	
(pkS3,skS3)
18	
Execu`on	Model	
C1	
(pkC1,skC1)	
C2	
(pkC2,skC2)	
C3	
(pkC3,skC3)	
S1	
(pkS1,skS1)	
S2	
(pkS2,skS2)	
S3	
(pkS3,skS3)	
skC1
19	
Execu`on	Model	
C1	
(pkC1,skC1)	
C2	
(pkC2,skC2)	
C3	
(pkC3,skC3)	
S1	
(pkS1,skS1)	
S2	
(pkS2,skS2)	
S3	
(pkS3,skS3)	
skC1	
k
Security	Defini`on	
20	
•  Aaacker	breaks	the	protocol	if	
1.  C	(or	S)	“accepts”	with	partner	S	(or	C),	but	
S	and	C	do	not	have	matching	conversa,ons,	or	
2.  it	dis7nguishes	“real”	from	“random”	key	
Protocol	Π	
C	
(pkC,skC)	 S	
(pkS,skS)
Security	Defini`on	
21	
•  Aaacker	breaks	the	protocol	if	
1.  C	(or	S)	“accepts”	with	partner	S	(or	C),	but	
S	and	C	do	not	have	matching	conversa,ons,	or	
2.  it	dis7nguishes	“real”	from	“random”	key	
Protocol	Π	
C	
(pkC,skC)	 S	
(pkS,skS)	
“accept”	with	key	
k	and	partner	S
Security	Defini`on	
22	
•  Aaacker	breaks	the	protocol	if	
1.  C	(or	S)	“accepts”	with	partner	S	(or	C),	but	
S	and	C	do	not	have	matching	conversa,ons,	or	
2.  it	dis7nguishes	“real”	from	“random”	key	
“Test”	
k	/	rnd	
“real”	/	“random”	
Protocol	Π	
C	
(pkC,skC)	 S	
(pkS,skS)	
“accept”	with	key	
k	and	partner	S
The	TLS	Handshake	is	not	a	
Provably	Secure	AKE	Protocol	
23	
Enc(k;constS,	finS)	 finS	=	PRF(ms;	L3,prev.	data)	
finC	=	PRF(ms;	L4,prev.	data)	 Enc(k;constC,	finC)	
2.	Key	exchange	
1.	Cipher	suite	agreement	
3.	FINISHED	messages:	
“Accept”	key	k	
with	partner	S	
“Accept”	key	k	
with	partner	C
The	TLS	Handshake	is	not	a	
Provably	Secure	AKE	Protocol	
•  Enc(k;constS,finS)	allows	to	dis7nguish	real	key	k	
from	random	
–  Applies	to	TLS-DHE,	TLS-DHS,	and	TLS-RSA	
–  Theore7cal	aFack	in	the	security	model	 24	
Enc(k;constS,	finS)	 finS	=	PRF(ms;	L3,prev.	data)	
finC	=	PRF(ms;	L4,prev.	data)	 Enc(k;constC,	finC)	
2.	Key	exchange	
1.	Cipher	suite	agreement	
3.	FINISHED	messages:	
“Accept”	key	k	
with	partner	S	
“Accept”	key	k	
with	partner	C
Unsa`sfying	Situa`on	
•  TLS	is	the	most	important	security	protocol		
in	prac`ce	
•  TLS	Handshake	is	insecure	in	any	AKE	security	
model	based	on	key-indis`nguishability	
•  Two	approaches	to	resolve	this	issue:	
1.  Consider	“truncated”	TLS	Handshake	[MSW’10],	
without	encryp7on	of	FINISHED	messages	
2.  Develop	a	new	security	model	
25
Unsa`sfying	Situa`on	
•  TLS	is	the	most	important	security	protocol		
in	prac`ce	
•  TLS	Handshake	is	insecure	in	any	AKE	security	
model	based	on	key-indis`nguishability	
•  Two	approaches	to	resolve	this	issue:	
1.  Consider	“truncated”	TLS	Handshake	[MSW’10],	
without	encryp7on	of	FINISHED	messages	
2.  Develop	a	new	security	model	
26
1st	Approach:	“Truncated	TLS”	
27	
finS	 finS	=	PRF(ms;	L3,prev.	data)	
finC	=	PRF(ms;	L4,prev.	data)	 finC	
2.	Key	exchange	
1.	Ciphersuite	agreement	
3.	FINISHED	messages:	
“Accept”	key	k	
with	partner	S	
“Accept”	key	k	
with	partner	C
1st	Approach:	“Truncated	TLS”	
28	
finS	 finS	=	PRF(ms;	L3,prev.	data)	
finC	=	PRF(ms;	L4,prev.	data)	 finC	
2.	Key	exchange	
1.	Ciphersuite	agreement	
3.	FINISHED	messages:	
Theorem:	
Truncated	TLS-DHE	Handshake	is	a	secure	AKE	protocol,	if	
•  the	PRF	is	a	secure	pseudo-random	func7on,	
•  the	digital	signature	scheme	is	EUF-CMA	secure,	
•  the	DDH	assump7on	holds,	and	
•  the	PRF-ODH	assump7on	holds	
“Accept”	key	k	
with	partner	S	
“Accept”	key	k	
with	partner	C
Comparison	to	Previous	Work	
Morrissey,	Smart,	Warinschi	‘10	 Our	work	
Bellare-Rogaway	Model	 Bellare-Rogaway	Model	
TLS_DHE,	TLS_DH,	TLS_RSA1	 TLS_DHE	
Random	Oracle	Model	 Standard	Model2	
29	
1	Assumes	different	RSA	encryp`on	scheme	
2	Requires	PRF-ODH	assump`on	
Modular	analysis
Monolithic	analysis
	
Truncated	TLS:	Morissey,	Smart,	Warinschi	‘10
Comparison	to	Previous	Work	
Morrissey,	Smart,	Warinschi	‘10	 Our	work	
Bellare-Rogaway	Model	 Bellare-Rogaway	Model	
TLS_DHE,	TLS_DH,	TLS_RSA1	 TLS_DHE	
Random	Oracle	Model	 Standard	Model2	
30	
1	Assumes	different	RSA	encryp`on	scheme	
2	Requires	PRF-ODH	assump`on	
Modular	analysis
Monolithic	analysis
	
Truncated	TLS:	Morissey,	Smart,	Warinschi	‘10	
Both	results	do	not	consider	the	real	TLS	Handshake…!
2nd	Approach:	New	Security	Model	
•  Secure	AKE	provides	indis7nguishable	keys	
–  Key	can	be	used	in	any	further	applica7on	
–  Too	strong	for	TLS	Handshake	
–  Stronger	than	necessary:	TLS	uses	keys	for	Record	Layer	
•  Can	we	describe	a	new	security	model	which	is	
–  strong	enough	to	provide	security,	but	
–  weak	enough	to	be	achievable	by	TLS?	
	
31
2nd	Approach:	New	Security	Model	
•  Secure	AKE	provides	indis7nguishable	keys	
–  Key	can	be	used	in	any	further	applica7on	
–  Too	strong	for	TLS	Handshake	
–  Stronger	than	necessary:	TLS	uses	keys	for	Record	Layer	
•  Can	we	describe	a	new	security	model	which	is	
–  strong	enough	to	provide	security,	but	
–  weak	enough	to	be	achievable	by	TLS?	
	
32	
but
Authen`cated	Confiden`al	Channel	
Establishment	(ACCE)	
•  Simple	extension	of	the	AKE	model:	
– Explicit	authen7ca7on	of	communica`on	partners	
– Good	cryptographic	keys	
Authen7cated	and	confiden7al	channel	
•  ACCE	considers	Handshake	+	Record	Layer	
– Encryp`ons	should	be	indis7nguishable	
– Ciphertexts	should	be	authen7cated	
33
TLS-DHE	is	a	Secure	ACCE	Protocol	
34	
Theorem:	
TLS-DHE	is	a	secure	ACCE	protocol,	if	
•  the	PRF	is	a	secure	pseudo-random	func7on,	
•  the	digital	signature	scheme	is	EUF-CMA	secure,	
•  the	DDH	assump7on	holds	in	the	Diffie-Hellman	group,	
•  the	PRF-ODH	assump7on	holds,	and	
•  the	Record	Layer	cipher	is	secure	(sLHAE)
TLS-DHE	is	a	Secure	ACCE	Protocol	
35	
Theorem:	
TLS-DHE	is	a	secure	ACCE	protocol,	if	
•  the	PRF	is	a	secure	pseudo-random	func7on,	
•  the	digital	signature	scheme	is	EUF-CMA	secure,	
•  the	DDH	assump7on	holds	in	the	Diffie-Hellman	group,	
•  the	PRF-ODH	assump7on	holds,	and	
•  the	Record	Layer	cipher	is	secure	(sLHAE)	
Stateful	Length-Hiding	Authen7cated	Encryp7on	[PRS’11]:	
•  Security	no`on	for	symmetric	ciphers	
•  Captures	exactly	what	is	expected	from	TLS	Record	Layer	
•  Achieved	by	CBC-based	ciphersuites	in	TLS	1.1	and	1.2
The	PRF-ODH	Assump`on	
36	
•  Let	G	=	<g>	be	a	group	with	order	p,		
let	PRF	:	G	x	M	à	R	be	a	func`on
The	PRF-ODH	Assump`on	
37	
Adversary	A	 Challenger	C	
m∈M	
•  Let	G	=	<g>	be	a	group	with	order	p,		
let	PRF	:	G	x	M	à	R	be	a	func`on
The	PRF-ODH	Assump`on	
38	
Adversary	A	 Challenger	C	
m∈M	
U,V∈G	
PRF(guv,m)		or		rand∈R	
•  Let	G	=	<g>	be	a	group	with	order	p,		
let	PRF	:	G	x	M	à	R	be	a	func`on	
U	:=	gu,	V	:=	gv	
where	u,v	ß	Zp
The	PRF-ODH	Assump`on	
39	
Adversary	A	 Challenger	C	
m∈M	
U,V∈G	
PRF(guv,m)		or		rand∈R	
W∈G,m’∈M	
PRF(Wu,m’)	
•  Let	G	=	<g>	be	a	group	with	order	p,		
let	PRF	:	G	x	M	à	R	be	a	func`on	
U	:=	gu,	V	:=	gv	
where	u,v	ß	Zp
The	PRF-ODH	Assump`on	
40	
Adversary	A	 Challenger	C	
m∈M	
U,V∈G	
PRF(guv,m)		or		rand∈R	
“real”	or	“random”	
W∈G,m’∈M	
PRF(Wu,m’)	
•  Let	G	=	<g>	be	a	group	with	order	p,		
let	PRF	:	G	x	M	à	R	be	a	func`on	
U	:=	gu,	V	:=	gv	
where	u,v	ß	Zp
The	PRF-ODH	Assump`on	
•  PRF-ODH	assump7on:	no	efficient	aaacker	can	
dis`nguish	PRF(guv,m)	from	random	
–  Variant	of	Oracle	Diffie-Hellman	assump`on	[ABR’01]	 41	
Adversary	A	 Challenger	C	
m∈M	
U,V∈G	
PRF(guv,m)		or		rand∈R	
“real”	or	“random”	
W∈G,m’∈M	
PRF(Wu,m’)	
•  Let	G	=	<g>	be	a	group	with	order	p,		
let	PRF	:	G	x	M	à	R	be	a	func`on	
U	:=	gu,	V	:=	gv	
where	u,v	ß	Zp
The	PRF-ODH	Assump`on	
•  PRF-ODH	assump7on:	no	efficient	aaacker	can	
dis`nguish	PRF(guv,m)	from	random	
–  Variant	of	Oracle	Diffie-Hellman	assump`on	[ABR’01]	 42	
Adversary	A	 Challenger	C	
m∈M	
U,V∈G	
PRF(guv,m)		or		rand∈R	
“real”	or	“random”	
W∈G,m’∈M	
PRF(Wu,m’)	
•  Let	G	=	<g>	be	a	group	with	order	p,		
let	PRF	:	G	x	M	à	R	be	a	func`on	
U	:=	gu,	V	:=	gv	
where	u,v	ß	Zp
Is	PRF-ODH	really	necessary?	
•  Not	if	
–  no	corrup7ons	of	long-term	secrets	are	allowed,	or	
–  small	changes	are	made	to	TLS-DHE	Handshake	
•  E.g.	making	it	more	similar	to	Σ0	[CK’02]	
•  Impossible	to	avoid,	if	
–  security	model	with	corrup7ons	is	considered,	and	
–  reduc`on	uses	aFacker	and	PRF	as	black-box	
43
Is	PRF-ODH	really	necessary?	
•  Not	if	
–  no	corrup7ons	of	long-term	secrets	are	allowed,	or	
–  small	changes	are	made	to	TLS-DHE	Handshake	
•  E.g.	making	it	more	similar	to	Σ0	[CK’02]	
•  Impossible	to	avoid,	if	
–  security	model	with	corrup7ons	is	considered,	and	
–  reduc`on	uses	aFacker	and	PRF	as	black-box	
44
Subsequent	Works	using	ACCE	
(This	work:	CRYPTO	2012)	
•  Further	TLS	cipher	suites:	
–  Krawczyk	et	al.,	Crypto	2013	
–  Li	et	al.,	PKC	2014	
•  Secure	re-nego`a`on	of	TLS	session	keys:	
–  Giesen	et	al.,	CCS	2013	
•  Other	prac`cal	protocols:	
–  EMV	channel	establishment	(Brzuska	et	al.,	CCS	2013)	
–  SSH	(Bergsma	et	al.,	CCS	2014)	
–  QUIC	(Lychev	et	al.,	S&P	2015).		
45
Subsequent	Works	using	ACCE	
(This	work:	CRYPTO	2012)	
•  Further	TLS	cipher	suites:	
–  Krawczyk	et	al.,	Crypto	2013	
–  Li	et	al.,	PKC	2014	
•  Secure	re-nego`a`on	of	TLS	session	keys:	
–  Giesen	et	al.,	CCS	2013	
•  Other	prac`cal	protocols:	
–  EMV	channel	establishment	(Brzuska	et	al.,	CCS	2013)	
–  SSH	(Bergsma	et	al.,	CCS	2014)	
–  QUIC	(Lychev	et	al.,	S&P	2015).		
46	
ACCE:	Not	beau`ful,	but	useful
ACCE:	Not	beau`ful,	but	useful	
47	
The	ACCE	security	model	
Cryptographers	analyzing	
“real-world”	protocols
Subsequent	Works	on	the	
Provable	Security	of	TLS	<=	1.2	
(This	work:	CRYPTO	2012)	
For	example:	
•  Krawczyk,	Paterson,	Wee	(CRYPTO	13):	
ACCE-based	analysis	of	TLS-RSA	and	TLS-sDH	
•  Bhargavan	e.a.	(Oakland	13):	
Formally-verified	implementa`on	of	TLS	(miTLS)	
•  Alterna`ves	to	ACCE:	
–  Brzuska	et	al.	(Informa`on	Security	2013):	
Relaxed	yet	composable	security	no`ons	for	key	exchange	
–  Bharghavan	e.a.	(CRYPTO	14):	
Use	real-or-random	key	for	encryp`on	of	FIN-message	
48
Subsequent	Works	on	the	
Provable	Security	of	TLS	1.3	
For	example:	
•  Krawczyk,	Wee	(Euro-S&P	16):	
Theore`cally-sound	founda`on	of	TLS	1.3	
•  Dowling,	Fischlin,	Günther,	Stebila	(ACM	CCS	2015):	
Formal	analysis	of	TLS	1.3	handshake	candidates	
•  Cremers,	Horvat,	Scoa,	Van	Der	Merwe	(Oakland	16):	
Automated	Analysis	of	TLS	1.3	
•  …	
49
Summary	
•  New	ACCE	security	model	
•  First	full	security	proof	for	TLS-DHE	
•  Many	follow-up	works,	but	also	many	open	
problems:		
– TLS	is	much	more	complex	–	we	(and	subsequent	
“pencil-and-paper”	proofs)	considered	only	the	
cryptographic	core	
– Other	promising	approaches:	
•  Verified	implementa`ons	(miTLS)	
•  Automated	Analysis	(see	Thyla’s	talk)	
50
Summary	
•  New	ACCE	security	model	
•  First	full	security	proof	for	TLS-DHE	
•  Many	follow-up	works,	but	also	many	open	
problems:		
– TLS	is	much	more	complex	–	we	(and	subsequent	
“pencil-and-paper”	proofs)	considered	only	the	
cryptographic	core	
– Other	promising	approaches:	
•  Verified	implementa`ons	(miTLS)	
•  Automated	Analysis	(see	Thyla’s	talk)	
51	
Thank	you!

More Related Content

PDF
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
PPTX
Alternative cryptocurrencies
PPTX
Smart contracts and applications part II
PPTX
Alternative cryptocurrencies
PPTX
Mining pools and attacks
PPTX
Smart contracts and applications part I
PPTX
A research-oriented introduction to the cryptographic currencies (starting wi...
PPTX
Michael schapira - Hebrew University Jeruslaem - Secure Internet Routing
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
Alternative cryptocurrencies
Smart contracts and applications part II
Alternative cryptocurrencies
Mining pools and attacks
Smart contracts and applications part I
A research-oriented introduction to the cryptographic currencies (starting wi...
Michael schapira - Hebrew University Jeruslaem - Secure Internet Routing

Similar to On the Security of TLS-DHE in the Standard Model (20)

PPT
Transportsec
PDF
wolfSSL and TLS 1.3
PPTX
Transport Layer Security
PDF
Transport Layer Security
PDF
Webinar SSL English
PPTX
secure socket layer
PPTX
PDF
HTTPS, Here and Now
PDF
CNIT 141: 13. TLS
PPT
4th unit bkjnkljnkjxzczczxczxczxczxvzxvzxzxv
PPT
cryptography and network security thid.ppt
PPTX
group no 6.pptx
PPTX
Difference between TLS 1.2 vs TLS 1.3 and tutorial of TLS2 and TLS2 version c...
ODP
Tls 13final13
PDF
CNIT 141 13. TLS
PPTX
TLS - Transport Layer Security
PDF
Sử dụng TLS đúng cách - Phạm Tùng Dương
PPTX
Ssl (Secure Socket Layer)
ODP
Tls 1.3
PPT
ch16-Cryptography and Network Security.ppt
Transportsec
wolfSSL and TLS 1.3
Transport Layer Security
Transport Layer Security
Webinar SSL English
secure socket layer
HTTPS, Here and Now
CNIT 141: 13. TLS
4th unit bkjnkljnkjxzczczxczxczxczxvzxvzxzxv
cryptography and network security thid.ppt
group no 6.pptx
Difference between TLS 1.2 vs TLS 1.3 and tutorial of TLS2 and TLS2 version c...
Tls 13final13
CNIT 141 13. TLS
TLS - Transport Layer Security
Sử dụng TLS đúng cách - Phạm Tùng Dương
Ssl (Secure Socket Layer)
Tls 1.3
ch16-Cryptography and Network Security.ppt
Ad

More from vpnmentor (6)

PDF
On the Bit Security of Cryptographic Primitives. by Michael Walter
PDF
Homomorphic Lower Digit Removal and Improved FHE Bootstrapping by Kyoohyung Han
PPTX
Review of Previous ETAP Forums - Deepak Maheshwari
PPTX
India’s National Biometrics ID - Presented by Mr. Deepak Maheshwari
PDF
Automated Analysis of TLS 1.3
PDF
TLS: Past, Present, Future
On the Bit Security of Cryptographic Primitives. by Michael Walter
Homomorphic Lower Digit Removal and Improved FHE Bootstrapping by Kyoohyung Han
Review of Previous ETAP Forums - Deepak Maheshwari
India’s National Biometrics ID - Presented by Mr. Deepak Maheshwari
Automated Analysis of TLS 1.3
TLS: Past, Present, Future
Ad

Recently uploaded (20)

PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
international classification of diseases ICD-10 review PPT.pptx
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
DOCX
Unit-3 cyber security network security of internet system
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
innovation process that make everything different.pptx
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPT
tcp ip networks nd ip layering assotred slides
PPTX
Introduction to Information and Communication Technology
PPTX
artificial intelligence overview of it and more
Triggering QUIC, presented by Geoff Huston at IETF 123
RPKI Status Update, presented by Makito Lay at IDNOG 10
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
international classification of diseases ICD-10 review PPT.pptx
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Decoding a Decade: 10 Years of Applied CTI Discipline
An introduction to the IFRS (ISSB) Stndards.pdf
522797556-Unit-2-Temperature-measurement-1-1.pptx
Unit-3 cyber security network security of internet system
Module 1 - Cyber Law and Ethics 101.pptx
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Slides PPTX World Game (s) Eco Economic Epochs.pptx
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
presentation_pfe-universite-molay-seltan.pptx
Introuction about WHO-FIC in ICD-10.pptx
innovation process that make everything different.pptx
Paper PDF World Game (s) Great Redesign.pdf
tcp ip networks nd ip layering assotred slides
Introduction to Information and Communication Technology
artificial intelligence overview of it and more

On the Security of TLS-DHE in the Standard Model