LπCET: A Logic Security Analysis for Cryptographic Protocols Based on π-Calculus Extension Theory

被引:0
|
作者
Wu, Fusheng [1 ]
Liu, Jinhui [2 ]
Li, Yanbin [3 ]
Ni, Mingtao [4 ]
机构
[1] Guizhou Univ Finance & Econ, Guizhou Key Lab Econ Syst Simulat, Guiyang 550025, Peoples R China
[2] Northwestern Polytech Univ, Sch Cybersecur, Xian 710072, Peoples R China
[3] Shandong Univ, Sch Software, Jinan 250100, Peoples R China
[4] Leshan Normal Univ, Sch Elect Informat & Artificial Intelligence, Leshan 614099, Peoples R China
基金
中国国家自然科学基金;
关键词
SEMANTICS;
D O I
10.1049/2024/2634744
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The pi-calculus is a basic theory of mobile communication based on the notion of interaction, which, is aimed at analyzing and modeling the behaviors of communication processes in communicating and mobile systems, and is widely applied to the security analysis of cryptographic protocol's design and implementation. But the pi-calculus does not provide seamless logical security analysis, so the logical flaws in the design and the implementation of a cryptographic protocol cannot be discovered in time. This paper introduces logical rules and logical proofs, binary tree, and the KMP algorithm and proposes a new extension of the pi-calculus theory, a logical security analysis method, and an algorithm. The aim is to analyze whether there are logical flaws in the design and the implementation of a cryptographic protocol, to ensure the security of the cryptographic protocol when it is encoded into software and implemented. This paper presents the logical security proof and analysis of the TLS1.3 protocol's interactional implementation process. Empirical results show that the additional extension theory, the logical security analysis method, and the algorithm can effectively analyze whether there are logical flaws in the design and the implementation of a cryptographic protocol.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Logic-based formal analysis of cryptographic protocols
    Muhammad, Shahabuddin
    Furqan, Zeeshan
    Guha, Ratan K.
    [J]. ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 300 - +
  • [2] Algebra model and security analysis for cryptographic protocols
    HUAI Jinpeng & LI Xianxian School of Computer
    [J]. Science China(Information Sciences), 2004, (02) : 199 - 220
  • [3] Algebra model and security analysis for cryptographic protocols
    Huai, JP
    Li, XX
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02): : 199 - 220
  • [4] Algebra model and security analysis for cryptographic protocols
    Jinpeng Huai
    Xianxian Li
    [J]. Science in China Series F: Information Sciences, 2004, 47 : 199 - 220
  • [5] A Calculus for the Analysis of Wireless Network Security Protocols
    Ballardin, Francesco
    Merro, Massimo
    [J]. FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 206 - 222
  • [6] A calculus for control flow analysis of security protocols
    Mikael Buchholtz
    Hanne Riis Nielson
    Flemming Nielson
    [J]. International Journal of Information Security, 2004, 2 (3-4) : 145 - 167
  • [7] A simple process calculus for the analysis of security protocols
    Gu, YG
    Fu, YX
    Li, GQ
    [J]. PDCAT 2005: Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, Proceedings, 2005, : 110 - 114
  • [8] A Logic for Signature based Security Protocols
    Feng, Chao
    Chen, Yuebing
    Zhang, Quan
    Tang, Chaojing
    [J]. ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 99 - 105
  • [9] A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols
    Mitchell, JC
    Ramanathan, A
    Scedrov, A
    Teague, V
    [J]. THEORETICAL COMPUTER SCIENCE, 2006, 353 (1-3) : 118 - 164
  • [10] Formal analysis of cryptographic protocols in a knowledge algorithm logic framework
    Xiao, Meihua
    Xue, Jinyun
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2007, 16 (04) : 701 - 706