Welcome to Journal of University of Chinese Academy of Sciences,Today is

Journal of University of Chinese Academy of Sciences ›› 2008, Vol. 25 ›› Issue (1): 110-116.DOI: 10.7523/j.issn.2095-6134.2008.1.015

Previous Articles     Next Articles

Computational Analysis of TLS Handshake Protocol

NI Yang, ZHANG Yu-Qing   

  1. Graduate University, Chinese Academy of Science,
    National Computer Network Intrusion Protection Center, Beijing 100043,China
  • Received:1900-01-01 Revised:1900-01-01 Online:2008-01-15

Abstract: As a typical authentication and key exchange protocol, TLS handshake protocol could be analyzed under the framework of BR computational model. We provide computational analysis of this protocol and prove that, when implemented with pseudorandom function as message authentication algorithm and encryption scheme which satisfies IND-CCA standard, the TLS handshake protocol is indeed secure under computational model. The technicalities of our proof reveal insights regarding the relationship between formal and computational models of security protocol.

CLC Number: