Skip to Main content Skip to Navigation
Theses

Preuves symboliques de propriétés d’indistinguabilité calculatoire

Abstract : Our society extensively relies on communications systems. Because such systems are used to exchange sensitive information and are pervasive, they need to be secured. Cryptographic protocols are what allow us to have secure communications. It is crucial that such protocols do not fail in providing the security properties they claim, as failures have dire consequences. Unfortunately, designing cryptographic protocols is notoriously hard, and major protocols are regularly and successfully attacked. We argue that formal verification is the best way to get a strong confidence in a protocol security. Basically, the goal is to mathematically prove that a protocol satisfies some security property.Our objective is to develop techniques to formally verify equivalence properties of cryptographic protocols, using a method that provides strong security guarantees while being amenable to automated deduction techniques. In this thesis, we argue that the Bana-Comon model for equivalence properties meets these goals. We support our claim through three different contributions.First, we design axioms for the usual functions used in security protocols, and for several cryptographic hypothesis. Second, we illustrate the usefulness of these axioms and of the model by completing case studies of concrete protocols: we study two RFID protocols, KCL et LAK, as well as the 5G-AKA authentication protocol used in mobile communication systems. For each of these protocols, we show existing or new attacks against current versions, propose fixes, and prove that the fixed versions are secure. Finally, we study the problem of proof automation in the Bana-Comon model, by showing the decidability of a set of inference rules which is a sound, though incomplete, axiomatization of computational indistinguishability when using an IND-CCA2 encryption scheme. From a cryptographer's point of view, this can be seen as the decidability of a fixed set of cryptographic game transformations.
Document type :
Theses
Complete list of metadatas

Cited literature [88 references]  Display  Hide  Download

https://tel.archives-ouvertes.fr/tel-02317745
Contributor : Abes Star :  Contact
Submitted on : Wednesday, October 16, 2019 - 12:05:20 PM
Last modification on : Monday, February 15, 2021 - 10:47:55 AM
Long-term archiving on: : Friday, January 17, 2020 - 3:27:30 PM

File

79033_KOUTSOS_2019_archivage.p...
Version validated by the jury (STAR)

Identifiers

  • HAL Id : tel-02317745, version 1

Collections

Citation

Adrien Koutsos. Preuves symboliques de propriétés d’indistinguabilité calculatoire. Informatique et langage [cs.CL]. Université Paris-Saclay, 2019. Français. ⟨NNT : 2019SACLN029⟩. ⟨tel-02317745⟩

Share

Metrics

Record views

365

Files downloads

191