TY - GEN
T1 - Modelling Identity-Based Authentication and Key Exchange Protocol Using the Tamarin Prover
AU - Mookherji, Srijanee
AU - Odelu, Vanga
AU - Prasath, Rajendra
AU - Reddy, Alavalapati Goutham
AU - Palaniswamy, Basker
N1 - Publisher Copyright:
© 2024, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
PY - 2024
Y1 - 2024
N2 - In real-time applications, authentication plays a vital role in enabling secure communications. The authentication protocols need to be formally verified under a defined threat model. Unless the protocols are verified for the intended security, the purpose of employing such protocols may eventually fail. There are multiple ways to formally verify the security of the authentication protocols including the use of automatic verification tools like the Tamarin Prover. The Tamarin Prover tool supports equational theories along with built-in functions. However, this tool does not support some mathematical operations such as elliptic curve point addition. It is necessary to have point addition in Identity-Based Encryption (IBE)-based authentication protocols. Chen–Kudla modelled the point addition operation in the Tamarin Prover using a technique based on concatenation. However, this technique is not applicable to all identity-based protocols including IBE-based authentication protocols. In this paper, we present a modelling technique known as normalised precomputation for point addition using a hash function. We analyse the security of a simple identity-based encryption-based key exchange protocol under extended Canetti and Krawczyk’s (eCK) adversary model. Our analysis shows that the proposed technique is secure and retains the properties of point addition. Therefore, the technique can be applied to different IBE-based authentication protocols where point addition operation is necessary.
AB - In real-time applications, authentication plays a vital role in enabling secure communications. The authentication protocols need to be formally verified under a defined threat model. Unless the protocols are verified for the intended security, the purpose of employing such protocols may eventually fail. There are multiple ways to formally verify the security of the authentication protocols including the use of automatic verification tools like the Tamarin Prover. The Tamarin Prover tool supports equational theories along with built-in functions. However, this tool does not support some mathematical operations such as elliptic curve point addition. It is necessary to have point addition in Identity-Based Encryption (IBE)-based authentication protocols. Chen–Kudla modelled the point addition operation in the Tamarin Prover using a technique based on concatenation. However, this technique is not applicable to all identity-based protocols including IBE-based authentication protocols. In this paper, we present a modelling technique known as normalised precomputation for point addition using a hash function. We analyse the security of a simple identity-based encryption-based key exchange protocol under extended Canetti and Krawczyk’s (eCK) adversary model. Our analysis shows that the proposed technique is secure and retains the properties of point addition. Therefore, the technique can be applied to different IBE-based authentication protocols where point addition operation is necessary.
KW - Authentication protocol
KW - eCK-Adversary model
KW - Elliptic curve point addition
KW - Key exchange
KW - The Tamarin Prover
UR - https://www.scopus.com/pages/publications/85177212659
U2 - 10.1007/978-981-99-5091-1_9
DO - 10.1007/978-981-99-5091-1_9
M3 - Conference proceeding
AN - SCOPUS:85177212659
SN - 9789819950904
T3 - Lecture Notes in Electrical Engineering
SP - 107
EP - 122
BT - Information Security, Privacy and Digital Forensics - Select Proceedings of the International Conference, ICISPD 2022
A2 - Patel, Sankita J.
A2 - Chaudhary, Naveen Kumar
A2 - Gohil, Bhavesh N.
A2 - Iyengar, S. S.
PB - Springer Science and Business Media Deutschland GmbH
T2 - International Conference on Information Security, Privacy, and Digital Forensics, 2022
Y2 - 2 December 2022 through 3 December 2022
ER -