Cryptographically sound and machine-assisted verification of security protocols

被引:0
|
作者
Backes, M [1 ]
Jacobi, C
机构
[1] IBM Corp, Zurich Res Lab, Ruschlikon, Switzerland
[2] IBM Seutschland Entwicklung GMBH, Processor Dev 2, Boblingen, Germany
来源
STACS 2003, PROCEEDINGS | 2003年 / 2607卷
关键词
cryptography; specification; verification; PVS; semantics; simulatability;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider machine-aided verification of suitably constructed abstractions of security protocols, such that the verified properties are valid for the concrete implementation of the protocol with respect to cryptographic definitions. In order to link formal methods and cryptography, we show that integrity properties are preserved under step-wise refinement in asynchronous networks with respect to cryptographic definitions, so formal verifications of our abstractions carry over to the concrete counterparts. As an example, we use the theorem prover PVS to formally verify a system for ordered secure message transmission, which yields the first example ever of a formally verified but nevertheless cryptographically sound proof of a security protocol. We believe that a general methodology for verifying cryptographic protocols cryptographically sound can be derived by following the ideas of this example.
引用
收藏
页码:675 / 686
页数:12
相关论文
共 50 条
  • [41] Adaptive virtual fixtures for machine-assisted teleoperation tasks
    Aarno, D
    Ekvall, S
    Kragic, D
    2005 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION (ICRA), VOLS 1-4, 2005, : 1139 - 1144
  • [42] COMMUNICATIVE GRAMMAR AND MACHINE-ASSISTED TEXT CONTENTS ANALYSIS
    HOPPE, A
    INTERNATIONAL CLASSIFICATION, 1984, 11 (01): : 9 - &
  • [43] Automated Verification of Accountability in Security Protocols
    Kuennemann, Robert
    Esiyok, Ilkan
    Backes, Michael
    2019 IEEE 32ND COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2019), 2019, : 397 - 413
  • [44] A Modeling and Verification Framework for Security Protocols
    Lilli, Mario
    RIGOROUS STATE-BASED METHODS, ABZ 2021, 2021, 12709 : 158 - 161
  • [45] Automatic Verification of Simulatability in Security Protocols
    Araragi, Tadashi
    Pereira, Olivier
    FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 275 - +
  • [46] AnBx - Security Protocols Design and Verification
    Bugliesi, Michele
    Modesti, Paolo
    AUTOMATED REASONING FOR SECURITY PROTOCOL ANALYSIS AND ISSUES IN THE THEORY OF SECURITY, 2010, 6186 : 164 - 184
  • [47] Automatic verification of correspondences for security protocols
    Blanchet, Bruno
    JOURNAL OF COMPUTER SECURITY, 2009, 17 (04) : 363 - 434
  • [48] Formal automatic verification of security protocols
    Xiao, Meihua
    Xue, Jinyun
    2006 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, 2006, : 566 - +
  • [49] Challenges in the automated verification of security protocols
    Comon-Lundh, Hubert
    AUTOMATED REASONING, PROCEEDINGS, 2008, 5195 : 396 - 409
  • [50] Complexity of Security Protocols Verification Tools
    Mazur, Michal
    Kurkowski, Miroslaw
    2019 IEEE 15TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATICS (INFORMATICS 2019), 2019, : 403 - 408