Symmetric encryption in a simulatable Dolev-Yao style cryptographic library

M. Backes, B. Pfitzmann
Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004.  
Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protocol environments. The justification was done by defining an ideal system handling Dolev-Yao-style terms and a cryptographic realization with the same user interface, and by showing that the realization is as secure as the ideal system in the sense of reactive simulatability. This definition encompasses arbitrary active attacks
more » ... enjoys general composition and property-preservation properties. Security holds in the standard model of cryptography and under standard assumptions of adaptively secure primitives. A major primitive missing in that library so far is symmetric encryption. We show why symmetric encryption is harder to idealize in a way that allows general composition than existing primitives in this library. We discuss several approaches to overcome these problems. For our favorite approach we provide a detailed provably secure idealization of symmetric encryption within the given framework for constructing nested terms. * An extended version of this work is available as IACR Cryptology ePrint Archive Report 2004/059, http://eprint.iacr.org/.
doi:10.1109/csfw.2004.1310742 fatcat:bsgso37ajzg4hozoaq7ged3vvy