Cryptographically sound and machine-assisted verification of security protocols

被引:0
|
作者
Backes, M [1 ]
Jacobi, C
机构
[1] IBM Corp, Zurich Res Lab, Ruschlikon, Switzerland
[2] IBM Seutschland Entwicklung GMBH, Processor Dev 2, Boblingen, Germany
来源
STACS 2003, PROCEEDINGS | 2003年 / 2607卷
关键词
cryptography; specification; verification; PVS; semantics; simulatability;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider machine-aided verification of suitably constructed abstractions of security protocols, such that the verified properties are valid for the concrete implementation of the protocol with respect to cryptographic definitions. In order to link formal methods and cryptography, we show that integrity properties are preserved under step-wise refinement in asynchronous networks with respect to cryptographic definitions, so formal verifications of our abstractions carry over to the concrete counterparts. As an example, we use the theorem prover PVS to formally verify a system for ordered secure message transmission, which yields the first example ever of a formally verified but nevertheless cryptographically sound proof of a security protocol. We believe that a general methodology for verifying cryptographic protocols cryptographically sound can be derived by following the ideas of this example.
引用
收藏
页码:675 / 686
页数:12
相关论文
共 50 条
  • [1] A framework for machine-assisted user interface verification
    Bumbulis, P
    Alencar, PSC
    Cowan, DD
    Lucena, CJP
    ALGEBRAIC METHODOLOGY AND SOFTWARE TECHNOLOGY, 1995, 936 : 461 - 474
  • [2] An approach for machine-assisted verification of Timed CSP specifications
    Goethel, Thomas
    Glesner, Sabine
    INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2010, 6 (03) : 181 - 193
  • [3] Machine-Assisted Script Curation
    Cummings, Manuel R. Ciosici Joseph
    DeHaven, Mitchell
    Hedges, Alex
    Kankanampati, Yash
    Lee, Dong-Ho
    Weischedel, Ralph
    Freedman, Marjorie
    2021 CONFERENCE OF THE NORTH AMERICAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: HUMAN LANGUAGE TECHNOLOGIES: DEMONSTRATIONS (NAACL-HLT 2021), 2021, : 8 - 17
  • [4] Sound Verification of Security Protocols: From Design to Interoperable Implementations
    Arquint, Linard
    Wolf, Felix A.
    Lallemand, Joseph
    Sasse, Ralf
    Sprenger, Christoph
    Wiesner, Sven N.
    Basin, David
    Mueller, Peter
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 1077 - 1093
  • [5] Machine-Assisted Map Editing
    Bastani, Favyen
    He, Songtao
    Abbar, Sofiane
    Alizadehl, Mohammad
    Balakrishnan, Hari
    Chawla, Sanjay
    Madden, Sam
    26TH ACM SIGSPATIAL INTERNATIONAL CONFERENCE ON ADVANCES IN GEOGRAPHIC INFORMATION SYSTEMS (ACM SIGSPATIAL GIS 2018), 2018, : 23 - 32
  • [6] Machine-Assisted Organic Synthesis
    Ley, Steven V.
    Fitzpatrick, Daniel E.
    Myers, Rebecca M.
    Battilocchio, Claudio
    Ingham, Richard. J.
    ANGEWANDTE CHEMIE-INTERNATIONAL EDITION, 2015, 54 (35) : 10122 - 10136
  • [7] Machine-Assisted Proofs for Institutions in Coq
    Reynolds, Conor
    Monahan, Rosemary
    INTEGRATED FORMAL METHODS, IFM 2022, 2022, 13274 : 369 - 372
  • [8] Verification of Security Protocols
    Cortier, Veronique
    VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, 2009, 5403 : 5 - 13
  • [9] Machine-assisted cultivation and analysis of biofilms
    Hansen, Silla H.
    Kabbeck, Tobias
    Radtke, Carsten P.
    Krause, Susanne
    Krolitzki, Eva
    Peschke, Theo
    Gasmi, Jannis
    Rabe, Kersten S.
    Wagner, Michael
    Horn, Harald
    Hubbuch, Juergen
    Gescher, Johannes
    Niemeyer, Christof M.
    SCIENTIFIC REPORTS, 2019, 9 (1)
  • [10] Machine-assisted nutritional and metabolic support
    Reignier, Jean
    Arabi, Yaseen M.
    Preiser, Jean-Charles
    INTENSIVE CARE MEDICINE, 2022, 48 (10) : 1426 - 1428