Type-Based Automated Verification of Authenticity in Cryptographic Protocols

被引:0
|
作者
Kikuchi, Daisuke [1 ]
Kobayashi, Naoki [1 ]
机构
[1] Tohoku Univ, Grad Sch Informat Sci, Sendai, Miyagi 980, Japan
关键词
CORRESPONDENCE ASSERTIONS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Gordon and Jeffrey have proposed a type and effect system for checking authenticity in cryptographic protocols. The type system reduces the protocol verification problem to the type checking problem, but protocols must be manually annotated with non-trivial types and effects. To automate the verification of cryptographic protocols, we modify Gordon and Jeffrey's type system and develop a type inference algorithm. Key modifications for enabling automated type inference are introduction of fractional effects and replacement of typing rules with syntax-directed ones. We have implemented and tested a prototype protocol verifier based on our type system.
引用
收藏
页码:222 / 236
页数:15
相关论文
共 50 条
  • [21] Formal verification of cryptographic protocols: A survey
    Meadows, CA
    ADVANCES IN CRYPTOLOGY - ASIACRYPT '94, 1995, 917 : 135 - 150
  • [22] Cryptographic Protocols for Confidentiality, Authenticity and Privacy on Constrained Devices
    Hajny, Jan
    Dzurenda, Petr
    Marques, Raul Casanova
    Malina, Lukas
    2020 12TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT 2020), 2020, : 87 - 92
  • [23] Type-Based Verification of Connectivity Constraints in Lattice Surgery
    Wakizaka, Ryo
    Suzuki, Yasunari
    Igarashi, Atsushi
    PROGRAMMING LANGUAGES AND SYSTEMS, APLAS 2024, 2025, 15194 : 216 - 237
  • [24] Game-Based Automated Security Proofs for Cryptographic Protocols
    Gu Chunxiang
    Guang Yan
    Zhu Yuefei
    CHINA COMMUNICATIONS, 2011, 8 (04) : 50 - 57
  • [25] Verification of cryptographic protocols: tagging enforces termination
    Blanchet, B
    Podelski, A
    THEORETICAL COMPUTER SCIENCE, 2005, 333 (1-2) : 67 - 90
  • [26] Integrating verification, testing, and learning for cryptographic protocols
    Oostdijk, M.
    Rusu, V.
    Tretmans, J.
    de Vries, R. G.
    Willemse, T. A. C.
    INTEGRATED FORMAL METHODS, PROCEEDINGS, 2007, 4591 : 538 - 557
  • [27] Tidy: Symbolic Verification of Timed Cryptographic Protocols
    Barthe, Gilles
    Dal Lago, Ugo
    Malavolta, Giulio
    Rakotonirina, Itsaka
    PROCEEDINGS OF THE 2022 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2022, 2022, : 263 - 276
  • [28] Verification of cryptographic protocols: Tagging enforces termination
    Blanchet, B
    Podelski, A
    FOUNDATIONS OF SOFTWARE SCIENCE AND COMPUTATION STRUCTURES, PROCEEDINGS, 2003, 2620 : 136 - 152
  • [29] Automated Verification Of Cryptographic Protocol Implementations
    Babenko, Liudmila
    Pisarev, Ilya
    12TH INTERNATIONAL CONFERENCE ON THE DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2019), 2019, : 849 - 854
  • [30] Automatic verification of time sensitive cryptographic protocols
    Delzanno, G
    Ganty, P
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PROCEEDINGS, 2004, 2988 : 342 - 356