Knowledge structure approach to verification of authentication protocols

被引:0
|
作者
SU Kaile
机构
关键词
formal verification; security protocol; epistemic logic; Kripke semantics; knowledge structure;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The standard Kripke semantics of epistemic logics has been applied successfully to reasoning communication protocols under the assumption that the network is not hostile. This paper introduces a natural semantics of Kripke semantics called knowledge structure and, by this kind of Kripke semantics, analyzes communication protocols over hostile networks, especially on authentication protocols. Compared with BAN-like logics, the method is automatically implementable because it operates on the actual definitions of the protocols, not on some difficult-to-establish justifications of them. What is more, the corresponding tool called SPV (Security Protocol Verifier) has been developed. Another salient point of this approach is that it is justification-oriented instead of falsification-oriented, i.e. finding bugs in protocols.
引用
收藏
页码:513 / 532
页数:20
相关论文
共 50 条
  • [1] Knowledge structure approach to verification of authentication protocols
    Su, KL
    Lü, GF
    Chen, QL
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2005, 48 (04): : 513 - 532
  • [2] Knowledge structure approach to verification of authentication protocols
    Kaile Su
    Guanfeng Lü
    Qingliang Chen
    [J]. Science in China Series F: Information Sciences, 2005, 48 : 513 - 532
  • [3] An Approach for Formal Verification of Authentication Protocols
    A. M. Mironov
    [J]. Lobachevskii Journal of Mathematics, 2022, 43 : 443 - 454
  • [4] An Approach for Formal Verification of Authentication Protocols
    Mironov, A. M.
    [J]. LOBACHEVSKII JOURNAL OF MATHEMATICS, 2022, 43 (02) : 443 - 454
  • [5] Property verification for authentication protocols
    Indiradevi, K
    Nair, VSS
    Abraham, JA
    [J]. ASSET'99: 1999 IEEE SYMPOSIUM ON APPLICATION-SPECIFIC SYSTEMS AND SOFTWARE ENGINEERING & TECHNOLOGY - PROCEEDINGS, 1999, : 82 - 85
  • [6] VERIFICATION AND MODELING OF AUTHENTICATION PROTOCOLS
    HAUSER, RC
    LEE, ES
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1992, 648 : 141 - 154
  • [7] Security Verification for Authentication and Key Exchange Protocols
    Otat, Haruki
    Kiyomotot, Shinsaku
    Tanakat, Toshiaki
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 1 - 11
  • [8] Formal automatic verification of authentication cryptographic protocols
    Debbabi, M
    Mejri, M
    Tawbi, N
    Yahmadi, I
    [J]. FIRST IEEE INTERNATIONAL CONFERENCE ON FORMAL ENGINEERING METHODS, PROCEEDINGS, 1997, : 50 - 59
  • [9] Verification of authentication protocols based on the binding relation
    Hagiya, M
    Takemura, R
    Takahashi, K
    Saito, T
    [J]. SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 299 - 316
  • [10] Security Verification for Authentication and Key Exchange Protocols
    Ota, Haruki
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 507 - 512