Authors
Hugo Krawczyk, Kenneth G Paterson, Hoeteck Wee
Publication date
2013/8/18
Book
Annual Cryptology Conference
Pages
429-448
Publisher
Springer Berlin Heidelberg
Description
TLS is the most widely-used cryptographic protocol on the Internet. It comprises the TLS Handshake Protocol, responsible for authentication and key establishment, and the TLS Record Protocol, which takes care of subsequent use of those keys to protect bulk data. In this paper, we present the most complete analysis to date of the TLS Handshake protocol and its application to data encryption (in the Record Protocol). We show how to extract a key-encapsulation mechanism (KEM) from the TLS Handshake Protocol, and how the security of the entire TLS protocol follows from security properties of this KEM when composed with a secure authenticated encryption scheme in the Record Protocol. The security notion we achieve is a variant of the ACCE notion recently introduced by Jager et al. (Crypto ’12). Our approach enables us to analyse multiple different key establishment methods in a modular fashion …
Total citations
2013201420152016201720182019202020212022202320249223036412519272214196
Scholar articles
H Krawczyk, KG Paterson, H Wee - Annual Cryptology Conference, 2013