Type-Based Automated Verification of Authenticity in Cryptographic Protocols

被引:0
|
作者
Kikuchi, Daisuke [1 ]
Kobayashi, Naoki [1 ]
机构
[1] Tohoku Univ, Grad Sch Informat Sci, Sendai, Miyagi 980, Japan
关键词
CORRESPONDENCE ASSERTIONS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Gordon and Jeffrey have proposed a type and effect system for checking authenticity in cryptographic protocols. The type system reduces the protocol verification problem to the type checking problem, but protocols must be manually annotated with non-trivial types and effects. To automate the verification of cryptographic protocols, we modify Gordon and Jeffrey's type system and develop a type inference algorithm. Key modifications for enabling automated type inference are introduction of fractional effects and replacement of typing rules with syntax-directed ones. We have implemented and tested a prototype protocol verifier based on our type system.
引用
收藏
页码:222 / 236
页数:15
相关论文
共 50 条
  • [31] Formal automatic verification of authentication cryptographic protocols
    Debbabi, M
    Mejri, M
    Tawbi, N
    Yahmadi, I
    FIRST IEEE INTERNATIONAL CONFERENCE ON FORMAL ENGINEERING METHODS, PROCEEDINGS, 1997, : 50 - 59
  • [32] On the Representation and Verification of Cryptographic Protocols in a Theory of Action
    Delgrande, James P.
    Hunter, Aaron
    Grote, Torsten
    PST 2010: 2010 EIGHTH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2010, : 39 - 45
  • [33] Type-based analysis of key management in PKCS#11 cryptographic devices
    Centenaro, Matteo
    Focardi, Riccardo
    Luccio, Flaminia L.
    JOURNAL OF COMPUTER SECURITY, 2013, 21 (06) : 971 - 1007
  • [34] Verification of protocols for automated negotiation
    Paurobally, S
    Cunningham, J
    ECAI 2002: 15TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2002, 77 : 43 - 47
  • [35] Automated formal verification of protocols
    Avresky, DR
    Vassilaras, S
    SIXTH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 1997, : 166 - 169
  • [36] Efficient Verification of Cryptographic Protocols with Dynamic Epistemic Logic
    Chen, Xiaojuan
    Deng, Huiwen
    APPLIED SCIENCES-BASEL, 2020, 10 (18):
  • [37] An improved method for formal security verification of cryptographic protocols
    Watanabe, H
    Fujiwara, T
    Kasami, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1996, E79A (07) : 1089 - 1096
  • [38] Covering All the Bases: Type-Based Verification of Test Input Generators
    Zhou, Zhe
    Mishra, Ashish
    Delaware, Benjamin
    Jagannathan, Suresh
    PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2023, 7 (PLDI):
  • [39] Automated type-based analysis of injective agreement in the presence of compromised principals
    Sattarzadeh, Behnam
    Fallah, Mehran S.
    JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2015, 84 (05) : 576 - 610
  • [40] An improved automated type-based method for area assessment of wound surface
    Qi, Xin
    Ding, Lian
    Huang, Wenjian
    Wen, Bing
    Guo, Xiaohui
    Zhang, Jue
    WOUND REPAIR AND REGENERATION, 2017, 25 (01) : 150 - 158