Formal analysis of cryptographic protocols in a knowledge algorithm logic framework

被引:0
|
作者
Xiao, Meihua [1 ]
Xue, Jinyun
机构
[1] Chinese Acad Sci, Inst Software, State Key Lab Comp Sci, Beijing 100080, Peoples R China
[2] Jiangxi Normal Univ, Prov Key Lab High Performance Comp, Coll Comp Informat Engn, Nanchang 330027, Peoples R China
[3] Nanchang Univ, Sch Informat Engn, Dept Comp Sci, Nanchang 330029, Peoples R China
来源
CHINESE JOURNAL OF ELECTRONICS | 2007年 / 16卷 / 04期
关键词
formal method; cryptographic protocols; model checking; logic of knowledge algorithm; intruder model;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Logics for security protocol analysis require the formalization of an intruder model that specifies the capabilities of intruders. In this paper, we present a logic for security protocol analysis using knowledge algorithm under the Dolev-Yao model. Intruders are assumed to use algorithms to compute explicitly their knowledge, as well as intruder capabilities are captured by suitable restrictions on the algorithms used. The knowledge completeness of intruder capabilities is proved for model checking of cryptographic protocols. To reduce the model checking complexity, we develop some novel analysis strategies to simplify the intruder knowledge representation in this framework. For illustration purposes, we explore the use of SPIN for the security properties verification of BAN-Yahalom protocol and Helsinki protocol. Three attacks are found in only one general model about BAN-Yahalom protocol, and the Horng-Hsu attack to Helsinki protocol is exposed too. The experimental results show the verification validity and effectiveness.
引用
收藏
页码:701 / 706
页数:6
相关论文
共 50 条
  • [1] Formal analysis of cryptographic protocols in a knowledge algorithm logic framework
    State Key Laboratory for Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    不详
    不详
    Chin J Electron, 2007, 4 (701-706):
  • [2] Logic-based formal analysis of cryptographic protocols
    Muhammad, Shahabuddin
    Furqan, Zeeshan
    Guha, Ratan K.
    ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 300 - +
  • [3] Formal analysis of cryptographic protocol based on intruders algorithmic knowledge logic
    Xiao, MH
    Xue, JY
    ICEMI 2005: Conference Proceedings of the Seventh International Conference on Electronic Measurement & Instruments, Vol 7, 2005, : 530 - 533
  • [4] Formal analysis and design principles of cryptographic protocols
    Xu, X.D.
    Yue, D.W.
    Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute of Posts and Telecommunications, 2001, 21 (03):
  • [5] A Formal Analysis Method with Reasoning for Cryptographic Protocols
    Yan, Jingchen
    Wagatsuma, Kazunori
    Gao, Hongbiao
    Cheng, Jingde
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 566 - 570
  • [6] Formal Analysis for Cryptographic Protocols on a Trace Semantics
    Jiang, Yun
    Gong, HuaPing
    INTERNATIONAL CONFERENCE ON FUTURE NETWORKS, PROCEEDINGS, 2009, : 127 - 129
  • [7] On Formal Analysis of Cryptographic Protocols and Supporting Tool
    Xiao Meihua
    Jiang Yun
    Liu Qiaowei
    CHINESE JOURNAL OF ELECTRONICS, 2010, 19 (02): : 223 - 228
  • [8] Formal testing cryptographic protocols
    Igumnov, VS
    EDM 2005: International Workshop and Tutorials on Electron Devices and Materials, Proceedings, 2005, : 236 - 237
  • [9] A formal analysis for capturing replay attacks in cryptographic protocols
    Gao, Han
    Bodei, Chiara
    Degano, Pierpaolo
    Nielson, Hanne Riis
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 150 - +
  • [10] A survey on computationally sound formal analysis of cryptographic protocols
    Lei, Xin-Feng
    Song, Shu-Min
    Liu, Wei-Bing
    Xue, Rui
    Jisuanji Xuebao/Chinese Journal of Computers, 2014, 37 (05): : 993 - 1016