Formal Analysis of the Signal Protocol using the Scyther Tool

被引:0
|
作者
Almuzaini, Nawal Zaied [1 ]
Ahmad, Iftikhar [1 ]
机构
[1] King Abdulaziz Univ, Dept Informat Technol, Fac Comp & Informat Technol, Jeddah, Saudi Arabia
关键词
component; formal analysis; model checking; security analysis; scyther; VERIFICATION; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Signal is a popular cryptographic protocol designed by the Open Whisper System that delivers end-to-end encryption for instant messaging (IM) conversations. Furthermore, Signal is considered the core security protocol for numerous applications such as Facebook Messenger and the Google Allo application. The increased use of the signal protocol in different IM applications has made it imperative, which also makes it highly attractive for the intruders. Therefore, security analysis for the signal protocol is deemed necessary to ensure its capability in the security domain. This paper conducts a formal analysis of the security protocol using Scyther, which is a model checking tool that has been used in analysis of different protocols. In this work, the signal protocol is analyzed in three phases: registration phase, sending and receiving message phase, and sending a reply phase. The obtained results are addressed and compared with those from mathematical and other model checking approaches.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther
    Yang, Huihui
    Prinz, Andreas
    Oleshchuk, Vladmir
    [J]. 2016 24TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING (PDP), 2016, : 553 - 557
  • [2] Formal Verification of IEEE 802.16 Security Sublayer Using Scyther Tool
    Taha, Ahmed M.
    Abdel-Hamid, Amr T.
    Tahar, Sofiene
    [J]. 2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, 2009, : 172 - +
  • [3] Formal Verification of Authentication and Confidentiality for TACACS plus Security Protocol using Scyther
    Pradeep, R.
    Sunitha, N. R.
    Ravi, V
    Verma, Sushma
    [J]. 2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [4] A Formal Security Analysis of the Signal Messaging Protocol
    Cohn-Gordon, Katriel
    Cremers, Cas
    Dowling, Benjamin
    Garratt, Luke
    Stebila, Douglas
    [J]. 2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, : 451 - 466
  • [5] A Formal Security Analysis of the Signal Messaging Protocol
    Cohn-Gordon, Katriel
    Cremers, Cas
    Dowling, Benjamin
    Garratt, Luke
    Stebila, Douglas
    [J]. JOURNAL OF CRYPTOLOGY, 2020, 33 (04) : 1914 - 1983
  • [6] A Formal Security Analysis of the Signal Messaging Protocol
    Katriel Cohn-Gordon
    Cas Cremers
    Benjamin Dowling
    Luke Garratt
    Douglas Stebila
    [J]. Journal of Cryptology, 2020, 33 : 1914 - 1983
  • [7] The Scyther tool: Verification, falsification, and analysis of security protocols
    Cremers, Cas J. F.
    [J]. COMPUTER AIDED VERIFICATION, 2008, 5123 : 414 - 418
  • [8] Cryptanalysis and improvement of the YAK protocol with formal security proof and security verification via Scyther
    Mohammad, Zeyad
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (09)
  • [9] Formal analysis of signal protocol based on logic of events theory
    Li, Zehuan
    Xiao, Meihua
    Xu, Ruihan
    [J]. SCIENTIFIC REPORTS, 2024, 14 (01):
  • [10] Towards more secure EMV purchase transactionsA new security protocol formally analyzed by the Scyther tool
    Nour El Madhoun
    Emmanuel Bertin
    Mohamad Badra
    Guy Pujolle
    [J]. Annals of Telecommunications, 2021, 76 : 203 - 222