Modular code-based cryptographic verification

Cédric Fournet, Markulf Kohlweiss, Pierre Yves Strub

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Type systems are effective tools for verifying the security of cryptographic programs. They provide automation, modularity and scalability, and have been applied to large security protocols. However, they traditionally rely on abstract assumptions on the underlying cryptographic primitives, expressed in symbolic models. Cryptographers usually reason on security assumptions using lower level, computational models that precisely account for the complexity and success probability of attacks. These models are more realistic, but they are harder to formalize and automate. We present the first modular automated program verification method based on standard cryptographic assumptions. We show how to verify ideal functionalities and protocols written in ML by typing them against new cryptographic interfaces using F7, a refinement type checker coupled with an SMT-solver. We develop a probabilistic core calculus for F7 and formalize its type safety in COQ. We build typed module and interfaces for MACs, signatures, and encryptions, and establish their authenticity and secrecy properties. We relate their ideal functionalities and concrete implementations, using game-based program transformations behind typed interfaces. We illustrate our method on a series of protocol implementations.

Original languageEnglish
Title of host publicationCCS'11 - Proceedings of the 18th ACM Conference on Computer and Communications Security
Pages341-350
Number of pages10
DOIs
Publication statusPublished - 14 Nov 2011
Externally publishedYes
Event18th ACM Conference on Computer and Communications Security, CCS'11 - Chicago, IL, United States
Duration: 17 Oct 201121 Oct 2011

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Conference

Conference18th ACM Conference on Computer and Communications Security, CCS'11
Country/TerritoryUnited States
CityChicago, IL
Period17/10/1121/10/11

Keywords

  • Cryptography
  • Refinement types
  • Security protocols

Fingerprint

Dive into the research topics of 'Modular code-based cryptographic verification'. Together they form a unique fingerprint.

Cite this