Abstract
Reasoning about key escrow protocols has increasingly become an important issue. The Escrowed Encryption Standard (EES) has been proposed as a US government standard for the encryption of unclassified telecommunications. One unique feature of this system is key escrow. The purpose of key escrow is to allow government access to session keys shared by EES devices. We develop a framework to formally specify and verify the correctness of key escrow protocols that we mechanize within the HOL theorem proving system. Our logic closely follows the logic, SVO, used for analyzing cryptographic protocols which was developed by Syverson and vanOorschot [13]. Using the HOL mechanization of SVO, we formally demonstrate the failure of the EES key escrow system by showing that it does not insure that the escrow agent receives correct information. This was previously shown experimentally [2]. Last, we offer an alternative escrow protocol and demonstrate its correctness.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Preview
Unable to display preview. Download preview PDF.
References
M. Abadi and M. Tuttle. A semantics for a logic of authentication. In Proceedings of the Tenth ACM Symposium on Principles of Distributed Computing, pages 201–216. ACM Press, 1991.
Matt Blaze. Protocol failure in the escrow encryption standard. In Lance J. Hoffman, editor, Building in Big Brother. Springer-Verlag, 1995.
Michael Burrows, Martin Abadi, and Roger Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(1), Feb. 1990.
Juanito Camilleri and Tom Melham. Reasoning with inductively defined relations in the HOL theorem prover. Technical Report 265, University of Cambridge Computer Laboratory, 1992.
D. Denning. The U.S. key escrow encrytion technology. Computer Communications, to appear.
Dorothy Denning. Cryptography and Data Security. Addision-Wesley, 1982.
National Institute for Standards and Technology. Escrow encrytion standard. Federal Information Processing Standards Pubulication 185, 1994.
L. Gong, R. Needham, and R. Yahalom. Reasoning about belief in cryptographic protocols. In Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy. IEEE Computer Society Press, 1990.
Tom Melham. Automating recursive type definitions in higher order logic. In G. Birtwhistle and P.A Subrahmanyam, editors, Current Trends in Hardware Verification and Automated Theorem Proving, pages 341–386. Springer-Verlag, 1989.
Bruce Schneier. Applied Cryptography. John Wiley & Sons, Inc, 1994.
E. Thomas Schubert. A hybrid model for reasoning about composed hardware systems. Conference on Computer-Aided Verification, June 1994.
Gustavus J. Simmons. Cryptanalysis and protocol failures. Communications of the ACM, 37(11), November 1994.
Paul F. Syverson and Paul C. van Oorschot. On unifying some cryptographic protocol logics. In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, May 1994.
P. vanOorschot. Extending cryptographic logics of cryptographic logics of belief to key agreement protocols. In Proceedings of the First ACM Conference on Computers and Communications Security, pages 232–243, 1993.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1995 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Schubert, T., Mocas, S. (1995). A mechanized logic for secure key escrow protocol verification. In: Thomas Schubert, E., Windley, P.J., Alves-Foss, J. (eds) Higher Order Logic Theorem Proving and Its Applications. TPHOLs 1995. Lecture Notes in Computer Science, vol 971. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-60275-5_73
Download citation
DOI: https://doi.org/10.1007/3-540-60275-5_73
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-60275-0
Online ISBN: 978-3-540-44784-9
eBook Packages: Springer Book Archive