Skip to main content

A mechanized logic for secure key escrow protocol verification

  • Conference paper
  • First Online:
Higher Order Logic Theorem Proving and Its Applications (TPHOLs 1995)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 971))

Included in the following conference series:

Abstract

Reasoning about key escrow protocols has increasingly become an important issue. The Escrowed Encryption Standard (EES) has been proposed as a US government standard for the encryption of unclassified telecommunications. One unique feature of this system is key escrow. The purpose of key escrow is to allow government access to session keys shared by EES devices. We develop a framework to formally specify and verify the correctness of key escrow protocols that we mechanize within the HOL theorem proving system. Our logic closely follows the logic, SVO, used for analyzing cryptographic protocols which was developed by Syverson and vanOorschot [13]. Using the HOL mechanization of SVO, we formally demonstrate the failure of the EES key escrow system by showing that it does not insure that the escrow agent receives correct information. This was previously shown experimentally [2]. Last, we offer an alternative escrow protocol and demonstrate its correctness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Abadi and M. Tuttle. A semantics for a logic of authentication. In Proceedings of the Tenth ACM Symposium on Principles of Distributed Computing, pages 201–216. ACM Press, 1991.

    Google Scholar 

  2. Matt Blaze. Protocol failure in the escrow encryption standard. In Lance J. Hoffman, editor, Building in Big Brother. Springer-Verlag, 1995.

    Google Scholar 

  3. Michael Burrows, Martin Abadi, and Roger Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(1), Feb. 1990.

    Google Scholar 

  4. Juanito Camilleri and Tom Melham. Reasoning with inductively defined relations in the HOL theorem prover. Technical Report 265, University of Cambridge Computer Laboratory, 1992.

    Google Scholar 

  5. D. Denning. The U.S. key escrow encrytion technology. Computer Communications, to appear.

    Google Scholar 

  6. Dorothy Denning. Cryptography and Data Security. Addision-Wesley, 1982.

    Google Scholar 

  7. National Institute for Standards and Technology. Escrow encrytion standard. Federal Information Processing Standards Pubulication 185, 1994.

    Google Scholar 

  8. L. Gong, R. Needham, and R. Yahalom. Reasoning about belief in cryptographic protocols. In Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy. IEEE Computer Society Press, 1990.

    Google Scholar 

  9. Tom Melham. Automating recursive type definitions in higher order logic. In G. Birtwhistle and P.A Subrahmanyam, editors, Current Trends in Hardware Verification and Automated Theorem Proving, pages 341–386. Springer-Verlag, 1989.

    Google Scholar 

  10. Bruce Schneier. Applied Cryptography. John Wiley & Sons, Inc, 1994.

    Google Scholar 

  11. E. Thomas Schubert. A hybrid model for reasoning about composed hardware systems. Conference on Computer-Aided Verification, June 1994.

    Google Scholar 

  12. Gustavus J. Simmons. Cryptanalysis and protocol failures. Communications of the ACM, 37(11), November 1994.

    Google Scholar 

  13. Paul F. Syverson and Paul C. van Oorschot. On unifying some cryptographic protocol logics. In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, May 1994.

    Google Scholar 

  14. P. vanOorschot. Extending cryptographic logics of cryptographic logics of belief to key agreement protocols. In Proceedings of the First ACM Conference on Computers and Communications Security, pages 232–243, 1993.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

E. Thomas Schubert Philip J. Windley James Alves-Foss

Rights and permissions

Reprints and permissions

Copyright information

© 1995 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Schubert, T., Mocas, S. (1995). A mechanized logic for secure key escrow protocol verification. In: Thomas Schubert, E., Windley, P.J., Alves-Foss, J. (eds) Higher Order Logic Theorem Proving and Its Applications. TPHOLs 1995. Lecture Notes in Computer Science, vol 971. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-60275-5_73

Download citation

  • DOI: https://doi.org/10.1007/3-540-60275-5_73

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-60275-0

  • Online ISBN: 978-3-540-44784-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics