Formal analysis of cryptographic protocols in a knowledge algorithm logic framework

被引:0
|
作者
Xiao, Meihua [1 ]
Xue, Jinyun
机构
[1] Chinese Acad Sci, Inst Software, State Key Lab Comp Sci, Beijing 100080, Peoples R China
[2] Jiangxi Normal Univ, Prov Key Lab High Performance Comp, Coll Comp Informat Engn, Nanchang 330027, Peoples R China
[3] Nanchang Univ, Sch Informat Engn, Dept Comp Sci, Nanchang 330029, Peoples R China
来源
CHINESE JOURNAL OF ELECTRONICS | 2007年 / 16卷 / 04期
关键词
formal method; cryptographic protocols; model checking; logic of knowledge algorithm; intruder model;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Logics for security protocol analysis require the formalization of an intruder model that specifies the capabilities of intruders. In this paper, we present a logic for security protocol analysis using knowledge algorithm under the Dolev-Yao model. Intruders are assumed to use algorithms to compute explicitly their knowledge, as well as intruder capabilities are captured by suitable restrictions on the algorithms used. The knowledge completeness of intruder capabilities is proved for model checking of cryptographic protocols. To reduce the model checking complexity, we develop some novel analysis strategies to simplify the intruder knowledge representation in this framework. For illustration purposes, we explore the use of SPIN for the security properties verification of BAN-Yahalom protocol and Helsinki protocol. Three attacks are found in only one general model about BAN-Yahalom protocol, and the Horng-Hsu attack to Helsinki protocol is exposed too. The experimental results show the verification validity and effectiveness.
引用
收藏
页码:701 / 706
页数:6
相关论文
共 50 条
  • [41] Ordering from Satan's menu: a survey of requirements specification for formal analysis of cryptographic protocols
    Meadows, C
    SCIENCE OF COMPUTER PROGRAMMING, 2004, 50 (1-3) : 3 - 22
  • [42] Modelling Attacker's Knowledge for Cascade Cryptographic Protocols
    Benaissa, Nazim
    ABSTRACT STATE MACHINES, B AND Z, PROCEEDINGS, 2008, 5238 : 251 - 264
  • [43] Formal proofs of cryptographic security of Diffie-Hellman-based protocols
    Roy, Arnab
    Datta, Anupam
    Mitchell, John C.
    TRUSTWORTHY GLOBAL COMPUTING, 2008, 4912 : 312 - +
  • [44] Symbolic trace analysis of cryptographic protocols
    Boreale, M
    AUTOMATA LANGUAGES AND PROGRAMMING, PROCEEDING, 2001, 2076 : 667 - 681
  • [45] Cryptographic Protocols Analysis in Event B
    Benaissa, Nazim
    Mery, Dominique
    PERSPECTIVES OF SYSTEMS INFORMATICS, 2010, 5947 : 282 - +
  • [46] Non interference for the analysis of cryptographic protocols
    Focardi, R
    Gorrieri, R
    Martinelli, F
    AUTOMATA LANGUAGES AND PROGRAMMING, 2000, 1853 : 354 - 372
  • [47] A Probabilistic Scheduler for the Analysis of Cryptographic Protocols
    Brlek, Srecko
    Hamadou, Sardaouna
    Mullins, John
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 194 (01) : 61 - 83
  • [48] A Performance Analysis Model for Cryptographic Protocols
    Olagunju, Amos
    Soenneker, Jake
    ICSIT 2011: THE 2ND INTERNATIONAL CONFERENCE ON SOCIETY AND INFORMATION TECHNOLOGIES, 2011, : 80 - 85
  • [49] Formal analysis of PUFs-based authentication protocols in logic of events theory
    Zhong X.
    Xiao M.
    Yang K.
    Luo Y.
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2024, 52 (02): : 69 - 76
  • [50] CVS: a compiler for the analysis of cryptographic protocols
    Durante, A
    Focardi, R
    Gorrieri, R
    PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, : 203 - 212