Using SPIN to model cryptographic protocols

被引:0
|
作者
Li, YJ [1 ]
Xue, R [1 ]
机构
[1] Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing 100080, Peoples R China
关键词
D O I
10.1109/ITCC.2004.1286745
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We explore the useof Spitz to model cryptographic protocols, and propose a general method to define the data structures used in the verification, such as facts, the intruder's knowledge, and so on. Based on this, we develop a general method to model the behaviors of honest principals and the intruder, in particular; we propose a general model for the intruder's deduction system. The method can be adapted to different protocols, and make it possible to transform a more abstract description of a sample protocol instance to Promela code. Our method is illustrated by using a revised TMN protocol, and the verification result has shown that it is a practical and useful way to analyze cryptographic protocols.
引用
收藏
页码:741 / 745
页数:5
相关论文
共 50 条
  • [1] Using SPIN to verify security properties of cryptographic protocols
    Maggi, P
    Sisto, R
    MODEL CHECKING SOFTWARE, PROCEEDINGS, 2002, 2318 : 187 - 204
  • [2] Cooperative Model Reconstruction for Cryptographic Protocols Using Visual Languages
    Weyers, Benjamin
    Luther, Wolfram
    Baloian, Nelson
    GROUPWARE-DESIGN: IMPLEMENTATION, AND USE, PROCEEDINGS, 2009, 5784 : 311 - +
  • [3] On using probabilistic Turing machines to model participants in cryptographic protocols
    Klingler, Lee
    Steinwandt, Rainer
    Unruh, Dominique
    THEORETICAL COMPUTER SCIENCE, 2013, 501 : 49 - 51
  • [4] A Performance Analysis Model for Cryptographic Protocols
    Olagunju, Amos
    Soenneker, Jake
    ICSIT 2011: THE 2ND INTERNATIONAL CONFERENCE ON SOCIETY AND INFORMATION TECHNOLOGIES, 2011, : 80 - 85
  • [5] The Model Reasoning Verifier for cryptographic protocols
    Liu, YW
    Li, WQ
    COMPUTER SCIENCE AND TECHNOLOGY IN NEW CENTURY, 2001, : 290 - 295
  • [6] A Logic to Model Time in Cryptographic Protocols
    Lei Xinfeng
    Liu Jun
    Xiao Jumno
    ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 399 - 403
  • [7] Algebra model and security analysis for cryptographic protocols
    HUAI Jinpeng & LI Xianxian School of Computer
    Science in China(Series F:Information Sciences), 2004, (02) : 199 - 220
  • [8] Algebra model and security analysis for cryptographic protocols
    Huai, JP
    Li, XX
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02): : 199 - 220
  • [9] Model-based testing of cryptographic protocols
    Rosenzweig, D
    Runje, D
    Schulte, W
    TRUSTWORTHY GLOBAL COMPUTING, 2005, 3705 : 33 - 60
  • [10] Algebra model and security analysis for cryptographic protocols
    Jinpeng Huai
    Xianxian Li
    Science in China Series F: Information Sciences, 2004, 47 : 199 - 220