Automatic verification of cryptographic protocols with SETHEO

被引:0
|
作者
Schumann, J [1 ]
机构
[1] Tech Univ Munich, Inst Informat, D-80290 Munich, Germany
来源
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we describe, how the automated theorem prover SETHEO is used far automatic verification of safety properties of cryptographic protocols. The protocols and their properties are specified using the so-called BAN logic, a multi-sorted modal logic capable of expressing beliefs about secure communication. The resulting formulas and inference rules are transformed into first order predicate logic and processed by the prover SETHEO. Proofs found by SETHEO are then automatically converted into a human-readable form. Experiments with several well-known protocols (e.g., Kerberos, Secure RPC handshake, and CCITT509) revealed very good results: the required properties of the protocols (as described in the literature) could be shown automatically within a few seconds of run-time.
引用
收藏
页码:87 / 100
页数:14
相关论文
共 50 条
  • [1] Automatic approximation for the verification of cryptographic protocols
    Oehl, F
    Cece, G
    Kouchnarenko, O
    Sinclair, D
    [J]. FORMAL ASPECTS OF SECURITY, 2003, 2629 : 33 - 48
  • [2] Automatic verification of time sensitive cryptographic protocols
    Delzanno, G
    Ganty, P
    [J]. TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PROCEEDINGS, 2004, 2988 : 342 - 356
  • [3] Formal automatic verification of authentication cryptographic protocols
    Debbabi, M
    Mejri, M
    Tawbi, N
    Yahmadi, I
    [J]. FIRST IEEE INTERNATIONAL CONFERENCE ON FORMAL ENGINEERING METHODS, PROCEEDINGS, 1997, : 50 - 59
  • [4] Automatic verification of cryptographic protocols through compositional analysis techniques
    Marchignoli, D
    Martinelli, F
    [J]. TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, 1999, 1579 : 148 - 162
  • [5] Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols
    Bozzano, M
    Delzanno, G
    [J]. JOURNAL OF SYMBOLIC COMPUTATION, 2004, 38 (05) : 1375 - 1415
  • [6] Automatic Verification for Secrecy of Cryptographic Protocols in First-Order Logic
    Han, Jihong
    Zhou, Zhiyong
    Wang, Yadi
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2009, 5 (01): : 14 - 14
  • [7] Automatic verification for secrecy of cryptographic protocols in first-order logic
    Han, Jihong
    Zhou, Zhiyong
    Wang, Yadi
    [J]. INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING, 2008, : 75 - 80
  • [8] Runtime verification of cryptographic protocols
    Bauer, Andreas
    Juerjens, Jan
    [J]. COMPUTERS & SECURITY, 2010, 29 (03) : 315 - 330
  • [9] Verifiable Verification in Cryptographic Protocols
    Fischlin, Marc
    Gunther, Felix
    [J]. PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 3239 - 3253
  • [10] Verification of stateful cryptographic protocols with exclusive OR
    Dreier, Jannik
    Hirschi, Lucca
    Radomirovic, Sasa
    Sasse, Ralf
    [J]. JOURNAL OF COMPUTER SECURITY, 2020, 28 (01) : 1 - 34