Type-Based Automated Verification of Authenticity in Cryptographic Protocols

被引:0
|
作者
Kikuchi, Daisuke [1 ]
Kobayashi, Naoki [1 ]
机构
[1] Tohoku Univ, Grad Sch Informat Sci, Sendai, Miyagi 980, Japan
关键词
CORRESPONDENCE ASSERTIONS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Gordon and Jeffrey have proposed a type and effect system for checking authenticity in cryptographic protocols. The type system reduces the protocol verification problem to the type checking problem, but protocols must be manually annotated with non-trivial types and effects. To automate the verification of cryptographic protocols, we modify Gordon and Jeffrey's type system and develop a type inference algorithm. Key modifications for enabling automated type inference are introduction of fractional effects and replacement of typing rules with syntax-directed ones. We have implemented and tested a prototype protocol verifier based on our type system.
引用
收藏
页码:222 / 236
页数:15
相关论文
共 50 条
  • [1] Type-Based Automated Verification of Authenticity in Asymmetric Cryptographic Protocols
    Dahl, Morten
    Kobayashi, Naoki
    Sun, Yunde
    Huttel, Hans
    AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, 2011, 6996 : 75 - +
  • [2] Type-based verification of electronic voting protocols
    Cortier, Véronique
    Eigner, Fabienne
    Kremer, Steve
    Maffei, Matteo
    Wiedling, Cyrille
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 9036 : 303 - 323
  • [3] Automated verification tools for cryptographic protocols
    Hassan, Adel
    Ishaq, Isam
    Minilla, Jorge
    2021 INTERNATIONAL CONFERENCE ON PROMISING ELECTRONIC TECHNOLOGIES (ICPET 2021), 2021, : 58 - 65
  • [4] Type-based verification of correspondence assertions for communication protocols
    Kikuchi, Daisuke
    Kobayashi, Naoki
    PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2007, 4807 : 191 - 205
  • [5] Automated Verification of Equivalence Properties of Cryptographic Protocols
    Chadha, Rohit
    Cheval, Vincent
    Ciobaca, Stefan
    Kremer, Steve
    ACM TRANSACTIONS ON COMPUTATIONAL LOGIC, 2016, 17 (04)
  • [6] Automated Verification of Equivalence Properties of Cryptographic Protocols
    Chadha, Rohit
    Ciobaca, Stefan
    Kremer, Steve
    PROGRAMMING LANGUAGES AND SYSTEMS, 2012, 7211 : 108 - 127
  • [7] Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR
    Dreier, Jannik
    Hirschi, Lucca
    Radomirovic, Sasa
    Sasse, Ralf
    IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018), 2018, : 359 - 373
  • [8] Authenticity types for cryptographic protocols
    Gordon, A
    FORMAL ASPECTS OF SECURITY, 2003, 2629 : 3 - 3
  • [9] Specification and Verification of Cryptographic Protocols based on TCPL
    Lei Xinfeng
    Li Xinghua
    Liu Jun
    Xiao Junmo
    ICCSSE 2009: PROCEEDINGS OF 2009 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2009, : 1216 - 1220
  • [10] Type-based Data Structure Verification
    Kawaguchi, Ming
    Rondon, Patrick
    Jhala, Ranjit
    PLDI'09 PROCEEDINGS OF THE 2009 ACM SIGPLAN CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION, 2009, : 304 - 315