Logic of Events for Proving Security Properties of Protocols

被引:11
|
作者
Xiao, Meihua [1 ]
Bickford, Mark [2 ]
机构
[1] Nanchang Univ, Sch Informat, Nanchang 330031, Peoples R China
[2] Cornell Univ, Dept Comp Sci, Ithaca, NY 14850 USA
关键词
Cryptographic Protocols; Formal Analysis; Logic of Events;
D O I
10.1109/WISM.2009.111
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Formal methods are vital for ensuring the security and reliability of the network systems. We propose a promising method to check security properties of cryptographic protocols using logic of events theory. The logic is designed around a message automaton with actions for possible protocol steps including generating new nonces, sending and receiving messages, and performing encryption, decryption and digital signature verification actions. We figure out types for the keys, nonces, and messages of the protocol and present novel proof rules and mechanism for protocol actions, temporal reasoning, and a specialized form of invariance rule. It puts no bound on the size of the principal and requires no state space enumeration. Our main theorem guarantees that any well-typed protocol is robustly safe under attack while reasoning only about the actions of honest principals in the protocol.
引用
收藏
页码:519 / +
页数:2
相关论文
共 50 条
  • [1] Proving properties of security protocols by induction
    Paulson, LC
    10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 70 - 83
  • [2] Proving security protocols correct
    Paulson, Lawrence C.
    Proceedings - Symposium on Logic in Computer Science, 1999, : 370 - 381
  • [3] Exploiting Symmetries When Proving Equivalence Properties for Security Protocols
    Cheval, Vincent
    Kremer, Steve
    Rakotonirina, Itsaka
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 905 - 922
  • [4] Strand spaces: proving security protocols correct
    MITRE Corp, Bedford, MA, United States
    J Computer Secur, 2 (191-230):
  • [5] LoET-E: A Refined Theory for Proving Security Properties of Cryptographic Protocols
    Song, Jiawen
    Xiao, Meihua
    Yang, Ke
    Wang, Xizhong
    Zhong, Xiaomei
    IEEE ACCESS, 2019, 7 : 59871 - 59883
  • [6] A Logic for Signature based Security Protocols
    Feng, Chao
    Chen, Yuebing
    Zhang, Quan
    Tang, Chaojing
    ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 99 - 105
  • [7] Semantics and logic Efor security protocols
    Jacobs, Bart
    Hasuo, Ichiro
    JOURNAL OF COMPUTER SECURITY, 2009, 17 (06) : 909 - 944
  • [8] Formalizing and Proving a Typing Result for Security Protocols in Isabelle/HOL
    Hess, Andreas Viktor
    Modersheim, Sebastian
    2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 451 - 463
  • [9] Proving security protocols with model checkers by data independence techniques
    Roscoe, AW
    11TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP - PROCEEDINGS, 1998, : 84 - 95
  • [10] A framework for proving the security of data transmission protocols in sensor network
    Wen, Mi
    Dong, Ling
    Zheng, Yanfei
    Chen, Kefei
    INTELLIGENCE AND SECURITY INFORMATICS, 2007, 4430 : 288 - +