Formal automatic verification of authentication cryptographic protocols

被引:5
|
作者
Debbabi, M
Mejri, M
Tawbi, N
Yahmadi, I
机构
关键词
algorithm; automatic formal verification; cryptographic protocols; authentication; proof system; flaws; attack scenario; termination;
D O I
10.1109/ICFEM.1997.630399
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We address the formal analysis of authentication cryptographic protocols. We present a new verification algorithm that generates from the protocol description the set of possible paws, if any, as well as the corresponding attack scenarios. This algorithm does not require any property or invariant specification. The algorithm involves three steps: extracting the protocol roles, modeling the intruder abilities and verification. In addition to the classical known intruder computational abilities such as encryption and decryption, we also consider those computations that result from different instrumentations of the protocol. The intruder abilities are modeled as a deductive system. The verification is based on the extracted roles as well as the deductive system. It consists in checking whether the intruder can answer all the challenges uttered by a particular role. If it is the case, an attack scenario is automatically constructed. The extracted proof system does not ensure the termination of deductions. For that purpose, we present a general transformation schema that allows one to automatically rewrite the non-terminating proof system into a terminating one. The transformation schema is shown to be correct. To exemplify the usefulness and efficiency of our approach, we illustrate it on the Woo and Lam authentication protocol. Abadi and Needham have shown, that the protocol is insecure and they proposed a new corrected version. Thanks to this method we have discovered new unknown flaws in the Woo and Lam protocol and in the corrected version of Abadi and Needham.
引用
收藏
页码:50 / 59
页数:10
相关论文
共 50 条
  • [31] Is the verification problem for cryptographic protocols solved?
    Bella, G
    Longo, C
    Paulson, LC
    [J]. SECURITY PROTOCOLS, 2005, 3364 : 183 - 189
  • [32] A Method of Formal Verification of Cryptographic Circuits
    Kanji Hirabayashi
    [J]. Journal of Electronic Testing, 1998, 13 : 321 - 322
  • [33] METHODICAL USE OF CRYPTOGRAPHIC TRANSFORMATIONS IN AUTHENTICATION PROTOCOLS
    MAO, W
    BOYD, C
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1995, 142 (04): : 272 - 278
  • [34] Property verification for authentication protocols
    Indiradevi, K
    Nair, VSS
    Abraham, JA
    [J]. ASSET'99: 1999 IEEE SYMPOSIUM ON APPLICATION-SPECIFIC SYSTEMS AND SOFTWARE ENGINEERING & TECHNOLOGY - PROCEEDINGS, 1999, : 82 - 85
  • [35] Integrating proof-based and model-checking techniques for the formal verification of cryptographic protocols
    Bolignano, D
    [J]. COMPUTER AIDED VERIFICATION, 1998, 1427 : 77 - 87
  • [36] VERIFICATION AND MODELING OF AUTHENTICATION PROTOCOLS
    HAUSER, RC
    LEE, ES
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1992, 648 : 141 - 154
  • [37] Studying Formal Security Proofs for Cryptographic Protocols
    Kogos, Konstantin G.
    Zapechnikov, Sergey, V
    [J]. INFORMATION SECURITY EDUCATION FOR A GLOBAL DIGITAL SOCIETY, WISE 10, 2017, 503 : 63 - 73
  • [38] Formal analysis and design principles of cryptographic protocols
    Xu, X.D.
    Yue, D.W.
    [J]. Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute of Posts and Telecommunications, 2001, 21 (03):
  • [39] On Formal Analysis of Cryptographic Protocols and Supporting Tool
    Xiao Meihua
    Jiang Yun
    Liu Qiaowei
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2010, 19 (02) : 223 - 228
  • [40] Formal Analysis for Cryptographic Protocols on a Trace Semantics
    Jiang, Yun
    Gong, HuaPing
    [J]. INTERNATIONAL CONFERENCE ON FUTURE NETWORKS, PROCEEDINGS, 2009, : 127 - 129