Modelling Identity-Based Authentication and Key Exchange Protocol Using the Tamarin Prover

  • Srijanee Mookherji
  • , Vanga Odelu
  • , Rajendra Prasath
  • , Alavalapati Goutham Reddy
  • , Basker Palaniswamy

Research output: Chapter in Book/Report/Conference proceedingsConference proceedingpeer-review

Abstract

In real-time applications, authentication plays a vital role in enabling secure communications. The authentication protocols need to be formally verified under a defined threat model. Unless the protocols are verified for the intended security, the purpose of employing such protocols may eventually fail. There are multiple ways to formally verify the security of the authentication protocols including the use of automatic verification tools like the Tamarin Prover. The Tamarin Prover tool supports equational theories along with built-in functions. However, this tool does not support some mathematical operations such as elliptic curve point addition. It is necessary to have point addition in Identity-Based Encryption (IBE)-based authentication protocols. Chen–Kudla modelled the point addition operation in the Tamarin Prover using a technique based on concatenation. However, this technique is not applicable to all identity-based protocols including IBE-based authentication protocols. In this paper, we present a modelling technique known as normalised precomputation for point addition using a hash function. We analyse the security of a simple identity-based encryption-based key exchange protocol under extended Canetti and Krawczyk’s (eCK) adversary model. Our analysis shows that the proposed technique is secure and retains the properties of point addition. Therefore, the technique can be applied to different IBE-based authentication protocols where point addition operation is necessary.

Original languageEnglish
Title of host publicationInformation Security, Privacy and Digital Forensics - Select Proceedings of the International Conference, ICISPD 2022
EditorsSankita J. Patel, Naveen Kumar Chaudhary, Bhavesh N. Gohil, S. S. Iyengar
PublisherSpringer Science and Business Media Deutschland GmbH
Pages107-122
Number of pages16
ISBN (Print)9789819950904
DOIs
Publication statusPublished - 2024
Externally publishedYes
EventInternational Conference on Information Security, Privacy, and Digital Forensics, 2022 - Goa, India
Duration: 2 Dec 20223 Dec 2022

Publication series

NameLecture Notes in Electrical Engineering
Volume1075 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

ConferenceInternational Conference on Information Security, Privacy, and Digital Forensics, 2022
Country/TerritoryIndia
CityGoa
Period2/12/223/12/22

Keywords

  • Authentication protocol
  • eCK-Adversary model
  • Elliptic curve point addition
  • Key exchange
  • The Tamarin Prover

Fingerprint

Dive into the research topics of 'Modelling Identity-Based Authentication and Key Exchange Protocol Using the Tamarin Prover'. Together they form a unique fingerprint.

Cite this