Constrained IoT devices are becoming ubiquitous in society and there is a need for secure communication protocols that respect the constraints under which these devices operate. EDHOC is an authenticated key establishment protocol for constrained IoT devices, currently being standardized by the Internet Engineering Task Force (IETF). A rudimentary version of EDHOC with only two key establishment methods was formally analyzed in 2018. Since then, the protocol has evolved significantly and several new key establishment methods have been added. In this paper, we present a formal analysis of all EDHOC methods in an enhanced symbolic Dolev-Yao model using the Tamarin tool. We show that not all methods satisfy the authentication notion injective of agreement, but that they all do satisfy a notion of implicit authentication, as well as Perfect Forward Secrecy (PFS) of the session key material. We identify other weaknesses to which we propose improvements. For example, a party may intend to establish a session key with a certain peer, but end up establishing it with another, trusted but compromised, peer. We communicated our findings and proposals to the IETF, which has incorporated some of these in newer versions of the standard.
翻译:互联网工程特别工作组(IETF)目前正在对受限制的IOT装置进行标准化。2018年,正式分析了EDHOC的初级版本,只有两种关键的建立方法。此后,协议有了重大发展,并增加了若干新的关键建立方法。在本文件中,我们用Tamarin工具用一个强化的象征性的Dolev-Yao模型正式分析了EDHOC的所有方法。我们向IETF通报了我们的调查结果和建议,后者已经将其中一些内容纳入标准的新版本。