Symbolic approach to the analysis of security protocols

被引:0
|
作者
Lafrance, S [1 ]
机构
[1] Ecole Polytech, Montreal, PQ H3C 3A7, Canada
关键词
symbolic; bisimulation; protocols; non-interference; process algebra; equivalence-checking; formal methods;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The specification and validation of security protocols often requires viewing function calls - like encryption/decryption and the generation of fake messages explicitly as actions within the process semantics. Following this approach, this paper introduces a symbolic framework based on value-passing processes able to handle symbolic values like fresh nonces, fresh keys, fake addresses and fake messages. The main idea in our approach is to assign to each value-passing process a formula describing the symbolic values conveyed by its semantics. In such symbolic processes, called constrained processes, the formulas are drawn from a logic based on a message algebra equipped with encryption, signature and hashing primitives. The symbolic operational semantics of a constrained process is then established through semantic rules updating formulas by adding restrictions over the symbolic values, as required for the process to evolve. We then prove that the logic required from the semantic rules is decidable. We also define a bisimulation equivalence between constrained processes; this amounts to a generalisation of the standard bisimulation equivalence between (non-symbolic) value-passing processes. Finally, we provide a complete symbolic bisimulation method for constructing the bisimulation between constrained processes.
引用
收藏
页码:1156 / 1198
页数:43
相关论文
共 50 条
  • [1] A method for symbolic analysis of security protocols
    Boreale, M
    Buscemi, MG
    [J]. THEORETICAL COMPUTER SCIENCE, 2005, 338 (1-3) : 393 - 425
  • [2] OFMC: A symbolic model checker for security protocols
    Basin D.
    Mödersheim S.
    Viganò L.
    [J]. International Journal of Information Security, 2005, 4 (3) : 181 - 208
  • [3] A generic model for symbolic analyzing security protocols
    Gu, YG
    Fu, YX
    Li, Y
    Dong, XJ
    [J]. Fifth International Conference on Computer and Information Technology - Proceedings, 2005, : 680 - 684
  • [4] Security protocols analysis: A SDL-based approach
    Lopez, J
    Ortega, JJ
    Troya, JM
    [J]. COMPUTER STANDARDS & INTERFACES, 2005, 27 (05) : 489 - 499
  • [5] Analysis of security protocols
    Durgin, NA
    Mitchell, JC
    [J]. CALCULATIONAL SYSTEM DESIGN, 1999, 173 : 369 - 394
  • [6] Timing attacks in security protocols: Symbolic framework and proof techniques
    Cheval, Vincent
    Cortier, Véronique
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 9036 : 280 - 299
  • [7] Automatic Verification of Security Protocols in the Symbolic Model: The Verifier Proverif
    [J]. Blanchet, Bruno (Bruno.Blanchet@inria.fr), 1600, Springer Verlag (8604):
  • [8] Symbolic trace analysis of cryptographic protocols
    Boreale, M
    [J]. AUTOMATA LANGUAGES AND PROGRAMMING, PROCEEDING, 2001, 2076 : 667 - 681
  • [9] Evolutionary approach in the security protocols design
    Ocenasek, P
    [J]. EC2ND 2005, PROCEEDINGS, 2006, : 147 - 156
  • [10] Modular approach to the design and analysis of password-based security protocols
    DengGuo Feng
    WeiDong Chen
    [J]. Science in China Series F: Information Sciences, 2007, 50 : 381 - 398