2013 IEEE Symposium on Security and Privacy (2013)
Berkeley, CA, USA USA
May 19, 2013 to May 22, 2013
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/SP.2013.37
TLS is possibly the most used protocol for secure communications, with a 18-year history of flaws and fixes, ranging from its protocol logic to its cryptographic design, and from the Internet standard to its diverse implementations. We develop a verified reference implementation of TLS 1.2. Our code fully supports its wire formats, ciphersuites, sessions and connections, re-handshakes and resumptions, alerts and errors, and data fragmentation, as prescribed in the RFCs; it interoperates with mainstream web browsers and servers. At the same time, our code is carefully structured to enable its modular, automated verification, from its main API down to computational assumptions on its cryptographic algorithms. Our implementation is written in F# and specified in F7. We present security specifications for its main components, such as authenticated stream encryption for the record layer and key establishment for the handshake. We describe their verification using the F7 typechecker. To this end, we equip each cryptographic primitive and construction of TLS with a new typed interface that captures its security properties, and we gradually replace concrete implementations with ideal functionalities. We finally typecheck the protocol state machine, and obtain precise security theorems for TLS, as it is implemented and deployed. We also revisit classic attacks and report a few new ones.
Provable Security, Transport Layer Security, Security Protocol Implementation, Formal Verification
K. Bhargavan, C. Fournet, M. Kohlweiss, A. Pironti and P. Strub, "Implementing TLS with Verified Cryptographic Security," 2013 IEEE Symposium on Security and Privacy(SP), Berkeley, CA, USA USA, 2013, pp. 445-459.