Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2015-11-28

AUTHORS

Christian Badertscher , Christian Matt , Ueli Maurer , Phillip Rogaway , Björn Tackmann

ABSTRACT

Motivated by the wide adoption of authenticated encryption and TLS, we suggest a basic channel abstraction, an augmented secure channel (ASC), that allows a sender to send a receiver messages consisting of two parts, where one is privacy-protected and both are authenticity-protected. Working in the tradition of constructive cryptography, we formalize this idea and provide a construction of this kind of channel using the lower-level tool authenticated-encryption.We look at recent proposals on TLS 1.3 and suggest that the criterion by which their security can be judged is quite simple: do they construct an ASC? Due to this precisely defined goal, we are able to give a natural construction that comes with a rigorous security proof and directly leads to a proposal on TLS 1.3 that is provably secure. More... »

PAGES

85-104

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-26059-4_5

DOI

http://dx.doi.org/10.1007/978-3-319-26059-4_5

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1048362085


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Department of Computer Science, ETH Zurich, Z\u00fcrich, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.5801.c", 
          "name": [
            "Department of Computer Science, ETH Zurich, Z\u00fcrich, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Badertscher", 
        "givenName": "Christian", 
        "id": "sg:person.010232721040.24", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010232721040.24"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computer Science, ETH Zurich, Z\u00fcrich, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.5801.c", 
          "name": [
            "Department of Computer Science, ETH Zurich, Z\u00fcrich, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Matt", 
        "givenName": "Christian", 
        "id": "sg:person.014520474132.60", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014520474132.60"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computer Science, ETH Zurich, Z\u00fcrich, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.5801.c", 
          "name": [
            "Department of Computer Science, ETH Zurich, Z\u00fcrich, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Maurer", 
        "givenName": "Ueli", 
        "id": "sg:person.01316567627.91", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01316567627.91"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computer Science, University of California, Davis, USA", 
          "id": "http://www.grid.ac/institutes/grid.27860.3b", 
          "name": [
            "Department of Computer Science, University of California, Davis, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Rogaway", 
        "givenName": "Phillip", 
        "id": "sg:person.014475776464.03", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014475776464.03"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computer Science & Engineering, University of California, San Diego, USA", 
          "id": "http://www.grid.ac/institutes/grid.266100.3", 
          "name": [
            "Department of Computer Science & Engineering, University of California, San Diego, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Tackmann", 
        "givenName": "Bj\u00f6rn", 
        "id": "sg:person.07617171521.69", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07617171521.69"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2015-11-28", 
    "datePublishedReg": "2015-11-28", 
    "description": "Motivated by the wide adoption of authenticated encryption and TLS, we suggest a basic channel abstraction, an augmented secure channel\u00a0(ASC), that allows a sender to send a receiver messages consisting of two parts, where one is privacy-protected and both are authenticity-protected. Working in the tradition of constructive cryptography, we formalize this idea and provide a construction of this kind of channel using the lower-level tool authenticated-encryption.We look at recent proposals on TLS\u00a01.3 and suggest that the criterion by which their security can be judged is quite simple: do they construct an ASC? Due to this precisely defined goal, we are able to give a natural construction that comes with a rigorous security proof and directly leads to a proposal on TLS\u00a01.3 that is provably secure.", 
    "editor": [
      {
        "familyName": "Au", 
        "givenName": "Man-Ho", 
        "type": "Person"
      }, 
      {
        "familyName": "Miyaji", 
        "givenName": "Atsuko", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-26059-4_5", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-319-26058-7", 
        "978-3-319-26059-4"
      ], 
      "name": "Provable Security", 
      "type": "Book"
    }, 
    "keywords": [
      "secure channel", 
      "low-level tools", 
      "rigorous security proof", 
      "constructive cryptography", 
      "record layer", 
      "channel abstraction", 
      "security proof", 
      "wide adoption", 
      "receiver's message", 
      "TLS", 
      "encryption", 
      "cryptography", 
      "kinds of channels", 
      "security", 
      "proposal", 
      "abstraction", 
      "sender", 
      "recent proposals", 
      "messages", 
      "goal", 
      "adoption", 
      "channels", 
      "tool", 
      "proof", 
      "construction", 
      "idea", 
      "kind", 
      "natural construction", 
      "part", 
      "criteria", 
      "layer", 
      "ASC", 
      "tradition"
    ], 
    "name": "Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer", 
    "pagination": "85-104", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1048362085"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-26059-4_5"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-26059-4_5", 
      "https://app.dimensions.ai/details/publication/pub.1048362085"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-05-20T07:48", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/chapter/chapter_450.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-319-26059-4_5"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-26059-4_5'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-26059-4_5'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-26059-4_5'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-26059-4_5'


 

This table displays all metadata directly associated to this object as RDF triples.

132 TRIPLES      23 PREDICATES      58 URIs      51 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-26059-4_5 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author Ne44e4dc1ab15463baf1fefc0b5f17de8
4 schema:datePublished 2015-11-28
5 schema:datePublishedReg 2015-11-28
6 schema:description Motivated by the wide adoption of authenticated encryption and TLS, we suggest a basic channel abstraction, an augmented secure channel (ASC), that allows a sender to send a receiver messages consisting of two parts, where one is privacy-protected and both are authenticity-protected. Working in the tradition of constructive cryptography, we formalize this idea and provide a construction of this kind of channel using the lower-level tool authenticated-encryption.We look at recent proposals on TLS 1.3 and suggest that the criterion by which their security can be judged is quite simple: do they construct an ASC? Due to this precisely defined goal, we are able to give a natural construction that comes with a rigorous security proof and directly leads to a proposal on TLS 1.3 that is provably secure.
7 schema:editor Ne6a1eb42719b443f9d472b3cc71e224b
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf N14112636d35c470f8bfc39145a534d92
12 schema:keywords ASC
13 TLS
14 abstraction
15 adoption
16 channel abstraction
17 channels
18 construction
19 constructive cryptography
20 criteria
21 cryptography
22 encryption
23 goal
24 idea
25 kind
26 kinds of channels
27 layer
28 low-level tools
29 messages
30 natural construction
31 part
32 proof
33 proposal
34 receiver's message
35 recent proposals
36 record layer
37 rigorous security proof
38 secure channel
39 security
40 security proof
41 sender
42 tool
43 tradition
44 wide adoption
45 schema:name Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer
46 schema:pagination 85-104
47 schema:productId Nb66704c3dfc343718990c17a3f2b0e2f
48 Nb82d317898904746965550638132c242
49 schema:publisher Nc829576fa79040d29d02d5b1d3ec15a3
50 schema:sameAs https://app.dimensions.ai/details/publication/pub.1048362085
51 https://doi.org/10.1007/978-3-319-26059-4_5
52 schema:sdDatePublished 2022-05-20T07:48
53 schema:sdLicense https://scigraph.springernature.com/explorer/license/
54 schema:sdPublisher Nac21005ee8084c158cdc7c90b14a1427
55 schema:url https://doi.org/10.1007/978-3-319-26059-4_5
56 sgo:license sg:explorer/license/
57 sgo:sdDataset chapters
58 rdf:type schema:Chapter
59 N0473466c1dae436fa4598d4cd3fc2c32 rdf:first sg:person.014475776464.03
60 rdf:rest N4e4e215bf0db49adb22d0ad65801fde0
61 N14112636d35c470f8bfc39145a534d92 schema:isbn 978-3-319-26058-7
62 978-3-319-26059-4
63 schema:name Provable Security
64 rdf:type schema:Book
65 N4e4e215bf0db49adb22d0ad65801fde0 rdf:first sg:person.07617171521.69
66 rdf:rest rdf:nil
67 N85cb0f62ec6541f3b1e7e6f4b025d6b4 rdf:first N95dd6edeaf45424d8d242f54b9d9a54c
68 rdf:rest rdf:nil
69 N923095d62ab94d8f8ff28f2ecb5819f2 rdf:first sg:person.014520474132.60
70 rdf:rest Ne0282412f9524c25b32f0750ed1fa8ad
71 N95dd6edeaf45424d8d242f54b9d9a54c schema:familyName Miyaji
72 schema:givenName Atsuko
73 rdf:type schema:Person
74 Nac21005ee8084c158cdc7c90b14a1427 schema:name Springer Nature - SN SciGraph project
75 rdf:type schema:Organization
76 Nb66704c3dfc343718990c17a3f2b0e2f schema:name doi
77 schema:value 10.1007/978-3-319-26059-4_5
78 rdf:type schema:PropertyValue
79 Nb82d317898904746965550638132c242 schema:name dimensions_id
80 schema:value pub.1048362085
81 rdf:type schema:PropertyValue
82 Nc829576fa79040d29d02d5b1d3ec15a3 schema:name Springer Nature
83 rdf:type schema:Organisation
84 Nd2734e0fc04f47c0b361e6e044e54134 schema:familyName Au
85 schema:givenName Man-Ho
86 rdf:type schema:Person
87 Ne0282412f9524c25b32f0750ed1fa8ad rdf:first sg:person.01316567627.91
88 rdf:rest N0473466c1dae436fa4598d4cd3fc2c32
89 Ne44e4dc1ab15463baf1fefc0b5f17de8 rdf:first sg:person.010232721040.24
90 rdf:rest N923095d62ab94d8f8ff28f2ecb5819f2
91 Ne6a1eb42719b443f9d472b3cc71e224b rdf:first Nd2734e0fc04f47c0b361e6e044e54134
92 rdf:rest N85cb0f62ec6541f3b1e7e6f4b025d6b4
93 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
94 schema:name Information and Computing Sciences
95 rdf:type schema:DefinedTerm
96 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
97 schema:name Data Format
98 rdf:type schema:DefinedTerm
99 sg:person.010232721040.24 schema:affiliation grid-institutes:grid.5801.c
100 schema:familyName Badertscher
101 schema:givenName Christian
102 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010232721040.24
103 rdf:type schema:Person
104 sg:person.01316567627.91 schema:affiliation grid-institutes:grid.5801.c
105 schema:familyName Maurer
106 schema:givenName Ueli
107 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01316567627.91
108 rdf:type schema:Person
109 sg:person.014475776464.03 schema:affiliation grid-institutes:grid.27860.3b
110 schema:familyName Rogaway
111 schema:givenName Phillip
112 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014475776464.03
113 rdf:type schema:Person
114 sg:person.014520474132.60 schema:affiliation grid-institutes:grid.5801.c
115 schema:familyName Matt
116 schema:givenName Christian
117 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014520474132.60
118 rdf:type schema:Person
119 sg:person.07617171521.69 schema:affiliation grid-institutes:grid.266100.3
120 schema:familyName Tackmann
121 schema:givenName Björn
122 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07617171521.69
123 rdf:type schema:Person
124 grid-institutes:grid.266100.3 schema:alternateName Department of Computer Science & Engineering, University of California, San Diego, USA
125 schema:name Department of Computer Science & Engineering, University of California, San Diego, USA
126 rdf:type schema:Organization
127 grid-institutes:grid.27860.3b schema:alternateName Department of Computer Science, University of California, Davis, USA
128 schema:name Department of Computer Science, University of California, Davis, USA
129 rdf:type schema:Organization
130 grid-institutes:grid.5801.c schema:alternateName Department of Computer Science, ETH Zurich, Zürich, Switzerland
131 schema:name Department of Computer Science, ETH Zurich, Zürich, Switzerland
132 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...