Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols

被引:6
|
作者
Bozzano, M
Delzanno, G
机构
[1] IRST, ITC, I-38050 Trento, Italy
[2] Univ Genoa, DISI, I-16146 Genoa, Italy
关键词
linear logic; bottom-up evaluation; model checking; authentication protocols;
D O I
10.1016/j.jsc.2004.04.002
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we investigate the applicability of a bottom-up evaluation strategy for a first-order fragment of affine linear logic that we introduced in Theory Prac. Log. Program. 4 (2004) 1 for the purposes of automated verification of secrecy in cryptographic protocols. Following the Proceedings of the 12th Computer Security Foundations Workshop (1999) 55, we use multi-conclusion clauses to represent the behaviour of agents in a protocol session, and we adopt the Dolev-Yao intruder model. In addition, universal quantification provides a formal and declarative way to express creation of notices. Our approach is well suited to verifying properties which can be specified by means of minimal conditions. Unlike traditional approaches based on model checking, we can reason about parametric, infinite-state systems; thus we do not pose any limitation on the number of parallel runs of a protocol. Furthermore, our approach can be used both to find attacks and to verify secrecy for a protocol. We apply our method to analyse several classical examples of authentication protocols. Among them we consider the ffgg protocol (Proceedings of the Workshop on Formal Methods and Security Protocols (1999)). This protocol is a challenging case study in that it is free from sequential attacks, whereas it suffers from parallel attacks that occur only when at least two sessions are run in parallel. The other case studies are of the Otway-Rees protocol and several formulations of the Needham-Schroeder protocol. (C) 2004 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1375 / 1415
页数:41
相关论文
共 50 条
  • [1] Automatic Verification for Secrecy of Cryptographic Protocols in First-Order Logic
    Han, Jihong
    Zhou, Zhiyong
    Wang, Yadi
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2009, 5 (01): : 14 - 14
  • [2] Automatic verification for secrecy of cryptographic protocols in first-order logic
    Han, Jihong
    Zhou, Zhiyong
    Wang, Yadi
    INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING, 2008, : 75 - 80
  • [3] Automatic approximation for the verification of cryptographic protocols
    Oehl, F
    Cece, G
    Kouchnarenko, O
    Sinclair, D
    FORMAL ASPECTS OF SECURITY, 2003, 2629 : 33 - 48
  • [4] Automatic verification of cryptographic protocols with SETHEO
    Schumann, J
    AUTOMATED DEDUCTION - CADE-14, 1997, 1249 : 87 - 100
  • [5] Automatic verification of time sensitive cryptographic protocols
    Delzanno, G
    Ganty, P
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PROCEEDINGS, 2004, 2988 : 342 - 356
  • [6] Formal automatic verification of authentication cryptographic protocols
    Debbabi, M
    Mejri, M
    Tawbi, N
    Yahmadi, I
    FIRST IEEE INTERNATIONAL CONFERENCE ON FORMAL ENGINEERING METHODS, PROCEEDINGS, 1997, : 50 - 59
  • [7] AUTOMATIC VERIFICATION OF DISTRIBUTED LOGIC SPECIFICATIONS
    MALL, R
    PATNAIK, LM
    MICROPROCESSING AND MICROPROGRAMMING, 1994, 40 (01): : 43 - 56
  • [8] Efficient Verification of Cryptographic Protocols with Dynamic Epistemic Logic
    Chen, Xiaojuan
    Deng, Huiwen
    APPLIED SCIENCES-BASEL, 2020, 10 (18):
  • [9] HERMES:: An automatic tool for verification of secrecy in security protocols
    Bozga, L
    Lakhnech, Y
    Périn, M
    COMPUTER AIDED VERIFICATION, 2003, 2725 : 219 - 222
  • [10] Automated Verification of Equivalence Properties of Cryptographic Protocols
    Chadha, Rohit
    Cheval, Vincent
    Ciobaca, Stefan
    Kremer, Steve
    ACM TRANSACTIONS ON COMPUTATIONAL LOGIC, 2016, 17 (04)