Symbolic approach to the analysis of security protocols

被引:0
|
作者
Lafrance, S [1 ]
机构
[1] Ecole Polytech, Montreal, PQ H3C 3A7, Canada
关键词
symbolic; bisimulation; protocols; non-interference; process algebra; equivalence-checking; formal methods;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The specification and validation of security protocols often requires viewing function calls - like encryption/decryption and the generation of fake messages explicitly as actions within the process semantics. Following this approach, this paper introduces a symbolic framework based on value-passing processes able to handle symbolic values like fresh nonces, fresh keys, fake addresses and fake messages. The main idea in our approach is to assign to each value-passing process a formula describing the symbolic values conveyed by its semantics. In such symbolic processes, called constrained processes, the formulas are drawn from a logic based on a message algebra equipped with encryption, signature and hashing primitives. The symbolic operational semantics of a constrained process is then established through semantic rules updating formulas by adding restrictions over the symbolic values, as required for the process to evolve. We then prove that the logic required from the semantic rules is decidable. We also define a bisimulation equivalence between constrained processes; this amounts to a generalisation of the standard bisimulation equivalence between (non-symbolic) value-passing processes. Finally, we provide a complete symbolic bisimulation method for constructing the bisimulation between constrained processes.
引用
收藏
页码:1156 / 1198
页数:43
相关论文
共 50 条
  • [21] Layered Symbolic Security Analysis in DY
    Bhargavan, Karthikeyan
    Bichhawat, Abhishek
    Hosseyni, Pedram
    Kuesters, Ralf
    Pruiksma, Klaas
    Schmitz, Guido
    Waldmann, Clara
    Wuertele, Tim
    [J]. COMPUTER SECURITY - ESORICS 2023, PT III, 2024, 14346 : 3 - 21
  • [22] Universally Composable Symbolic Security Analysis
    Ran Canetti
    Jonathan Herzog
    [J]. Journal of Cryptology, 2011, 24 : 83 - 147
  • [23] A Z based approach to verifying security protocols
    Long, BW
    Fidge, CJ
    Cerone, A
    [J]. FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2003, 2885 : 375 - 395
  • [24] The Simplified Inductive Approach to Verifying Security Protocols
    Wang Juan
    Zhou Yajie
    Mang Huanguo
    [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 523 - 526
  • [25] Symbolic Analysis of Cryptographic Protocols Containing Bilinear Pairings
    Pankova, Alisa
    Laud, Peeter
    [J]. 2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 63 - 77
  • [26] Web security: Authentication protocols and their analysis
    Wen, W
    Mizoguchi, F
    [J]. NEW GENERATION COMPUTING, 2001, 19 (03) : 283 - 299
  • [27] Formal method for the analysis of security protocols
    Lu, Laifeng
    Ma, Jianfeng
    [J]. ICIC Express Letters, 2011, 5 (10): : 3785 - 3789
  • [28] Theoretical Analysis of RFID Security Protocols
    Zavvari, A.
    Islam, M. T.
    Shakiba, M.
    Mandeep, S. J.
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2014, : 302 - 306
  • [29] Towards a Quantitative Analysis of Security Protocols
    Adao, Pedro
    Mateus, Paulo
    Reis, Tiago
    Vigano, Luca
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 164 (03) : 3 - 25
  • [30] Analysis of Security Protocols for Mobile Healthcare
    Wazid, Mohammad
    Zeadally, Sherali
    Das, Ashok Kumar
    Odelu, Vanga
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)