A method for symbolic analysis of security protocols

被引:5
|
作者
Boreale, M
Buscemi, MG
机构
[1] Univ Pisa, Dipartimento Informat, I-56127 Pisa, Italy
[2] Univ Florence, Dipartimento Sistemi & Informat, Florence, Italy
关键词
security protocol analysis; symbolic techniques; process calculi;
D O I
10.1016/j.tcs.2005.03.044
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In security protocols, message exchange between the intruder and honest participants induces a form of state explosion which makes protocol models infinite. We propose a general method for automatic analysis of security protocols based on the notion of frame, essentially a rewrite system plus a set of distinguished terms called messages. Frames are intended to model generic crypto-systems. Based on frames, we introduce a process language akin to Abadi and Fournet's applied pi. For this language, we define a symbolic operational semantics that relies on unification and provides finite and effective protocol models. Next, we give a method to carry out trace analysis directly on the symbolic model. We spell out a regularity condition on the underlying frame, which guarantees completeness of our method for the considered class of properties, including secrecy and various forms of authentication. We show how to instantiate our method to some of the most common crypto-systems, including shared- and public-key encryption, hashing and Diffie-Hellman key exchange. (c) 2005 Elsevier B.V. All rights reserved.
引用
收藏
页码:393 / 425
页数:33
相关论文
共 50 条
  • [1] Symbolic approach to the analysis of security protocols
    Lafrance, S
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2004, 10 (09) : 1156 - 1198
  • [2] Formal method for the analysis of security protocols
    Lu, Laifeng
    Ma, Jianfeng
    [J]. ICIC Express Letters, 2011, 5 (10): : 3785 - 3789
  • [3] OFMC: A symbolic model checker for security protocols
    Basin D.
    Mödersheim S.
    Viganò L.
    [J]. International Journal of Information Security, 2005, 4 (3) : 181 - 208
  • [4] A generic model for symbolic analyzing security protocols
    Gu, YG
    Fu, YX
    Li, Y
    Dong, XJ
    [J]. Fifth International Conference on Computer and Information Technology - Proceedings, 2005, : 680 - 684
  • [5] A new formal analysis method for security protocols
    Lu Yang
    Xiao Junmo
    Liu Jing
    [J]. Advanced Computer Technology, New Education, Proceedings, 2007, : 724 - 729
  • [6] Formal Method for Security Analysis of Electronic Payment Protocols
    Liu, Yi
    Meng, Qingkun
    Liu, Xingtong
    Wang, Jian
    Zhang, Lei
    Tang, Chaojing
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (09): : 2291 - 2297
  • [7] Analysis of security protocols
    Durgin, NA
    Mitchell, JC
    [J]. CALCULATIONAL SYSTEM DESIGN, 1999, 173 : 369 - 394
  • [8] Timing attacks in security protocols: Symbolic framework and proof techniques
    Cheval, Vincent
    Cortier, Véronique
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 9036 : 280 - 299
  • [9] Automatic Verification of Security Protocols in the Symbolic Model: The Verifier Proverif
    [J]. Blanchet, Bruno (Bruno.Blanchet@inria.fr), 1600, Springer Verlag (8604):
  • [10] Symbolic trace analysis of cryptographic protocols
    Boreale, M
    [J]. AUTOMATA LANGUAGES AND PROGRAMMING, PROCEEDING, 2001, 2076 : 667 - 681