Using SPIN to model cryptographic protocols

被引:0
|
作者
Li, YJ [1 ]
Xue, R [1 ]
机构
[1] Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing 100080, Peoples R China
关键词
D O I
10.1109/ITCC.2004.1286745
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We explore the useof Spitz to model cryptographic protocols, and propose a general method to define the data structures used in the verification, such as facts, the intruder's knowledge, and so on. Based on this, we develop a general method to model the behaviors of honest principals and the intruder, in particular; we propose a general model for the intruder's deduction system. The method can be adapted to different protocols, and make it possible to transform a more abstract description of a sample protocol instance to Promela code. Our method is illustrated by using a revised TMN protocol, and the verification result has shown that it is a practical and useful way to analyze cryptographic protocols.
引用
收藏
页码:741 / 745
页数:5
相关论文
共 50 条
  • [31] Special Issue on Cryptographic Protocols
    Vogt, Andreas
    CRYPTOGRAPHY, 2018, 2 (03)
  • [32] A bisimulation method for cryptographic protocols
    Abadi, M
    Gordon, AD
    PROGRAMMING LANGUAGES AND SYSTEMS, 1998, 1381 : 12 - 26
  • [33] Secure Composition of Cryptographic Protocols
    Goyal, Vipul
    PROVABLE SECURITY, 2011, 6980 : 2 - 2
  • [34] A rational approach to cryptographic protocols
    Caballero-Gil, P.
    Henandez-Goya, C.
    Bruno-Castaneda, C.
    MATHEMATICAL AND COMPUTER MODELLING, 2007, 46 (1-2) : 80 - 87
  • [35] Searching for shapes in cryptographic protocols
    Doghmi, Shaddin F.
    Guttman, Joshua D.
    Thayer, F. Javier
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PROCEEDINGS, 2007, 4424 : 523 - 537
  • [36] On the Difficulty of Using Patient's Physiological Signals in Cryptographic Protocols
    Marin, Eduard
    Rua, Enrique Argones
    Singelee, Dave
    Preneel, Bart
    PROCEEDINGS OF THE 24TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT '19), 2019, : 113 - 122
  • [37] Visualization of cryptographic protocols with GRACE
    Cattaneo, G.
    De Santis, A.
    Petrillo, U. Ferraro
    JOURNAL OF VISUAL LANGUAGES AND COMPUTING, 2008, 19 (02): : 258 - 290
  • [38] Collusion analysis of cryptographic protocols
    Low, SH
    Maxemchuk, NF
    IEEE GLOBECOM 1996 - CONFERENCE RECORD, VOLS 1-3: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 1 - 5
  • [39] How to Formalize Loop Iterations in Cryptographic Protocols Using ProVerif
    Mieno, Takehiko
    Okazaki, Hiroyuki
    Arai, Kenichi
    Futa, Yuichi
    IEEE ACCESS, 2024, 12 : 31605 - 31625
  • [40] Cryptographic protocols with everyday objects
    Heather, James
    Schneider, Steve
    Teague, Vanessa
    FORMAL ASPECTS OF COMPUTING, 2014, 26 (01) : 37 - 62