Formal automatic verification of authentication cryptographic protocols

被引:5
|
作者
Debbabi, M
Mejri, M
Tawbi, N
Yahmadi, I
机构
关键词
algorithm; automatic formal verification; cryptographic protocols; authentication; proof system; flaws; attack scenario; termination;
D O I
10.1109/ICFEM.1997.630399
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We address the formal analysis of authentication cryptographic protocols. We present a new verification algorithm that generates from the protocol description the set of possible paws, if any, as well as the corresponding attack scenarios. This algorithm does not require any property or invariant specification. The algorithm involves three steps: extracting the protocol roles, modeling the intruder abilities and verification. In addition to the classical known intruder computational abilities such as encryption and decryption, we also consider those computations that result from different instrumentations of the protocol. The intruder abilities are modeled as a deductive system. The verification is based on the extracted roles as well as the deductive system. It consists in checking whether the intruder can answer all the challenges uttered by a particular role. If it is the case, an attack scenario is automatically constructed. The extracted proof system does not ensure the termination of deductions. For that purpose, we present a general transformation schema that allows one to automatically rewrite the non-terminating proof system into a terminating one. The transformation schema is shown to be correct. To exemplify the usefulness and efficiency of our approach, we illustrate it on the Woo and Lam authentication protocol. Abadi and Needham have shown, that the protocol is insecure and they proposed a new corrected version. Thanks to this method we have discovered new unknown flaws in the Woo and Lam protocol and in the corrected version of Abadi and Needham.
引用
收藏
页码:50 / 59
页数:10
相关论文
共 50 条
  • [1] Formal verification of cryptographic protocols: A survey
    Meadows, CA
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT '94, 1995, 917 : 135 - 150
  • [2] Automatic approximation for the verification of cryptographic protocols
    Oehl, F
    Cece, G
    Kouchnarenko, O
    Sinclair, D
    [J]. FORMAL ASPECTS OF SECURITY, 2003, 2629 : 33 - 48
  • [3] Automatic verification of cryptographic protocols with SETHEO
    Schumann, J
    [J]. AUTOMATED DEDUCTION - CADE-14, 1997, 1249 : 87 - 100
  • [4] An Approach for Formal Verification of Authentication Protocols
    A. M. Mironov
    [J]. Lobachevskii Journal of Mathematics, 2022, 43 : 443 - 454
  • [5] An Approach for Formal Verification of Authentication Protocols
    Mironov, A. M.
    [J]. LOBACHEVSKII JOURNAL OF MATHEMATICS, 2022, 43 (02) : 443 - 454
  • [6] Automatic verification of time sensitive cryptographic protocols
    Delzanno, G
    Ganty, P
    [J]. TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PROCEEDINGS, 2004, 2988 : 342 - 356
  • [7] An improved method for formal security verification of cryptographic protocols
    Watanabe, H
    Fujiwara, T
    Kasami, T
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1996, E79A (07) : 1089 - 1096
  • [8] Formal automatic verification of security protocols
    Xiao, Meihua
    Xue, Jinyun
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, 2006, : 566 - +
  • [9] Experimental comparison of automatic tools for the formal analysis of cryptographic protocols
    Cheminod, M.
    Bertolotti, I. Cibrario
    Durante, L.
    Sisto, R.
    Valenzano, A.
    [J]. DEPCOS - RELCOMEX '07: INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, PROCEEDINGS, 2007, : 153 - +
  • [10] Automatic verification of cryptographic protocols through compositional analysis techniques
    Marchignoli, D
    Martinelli, F
    [J]. TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, 1999, 1579 : 148 - 162