Logic of Events for Proving Security Properties of Protocols

被引:11
|
作者
Xiao, Meihua [1 ]
Bickford, Mark [2 ]
机构
[1] Nanchang Univ, Sch Informat, Nanchang 330031, Peoples R China
[2] Cornell Univ, Dept Comp Sci, Ithaca, NY 14850 USA
关键词
Cryptographic Protocols; Formal Analysis; Logic of Events;
D O I
10.1109/WISM.2009.111
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Formal methods are vital for ensuring the security and reliability of the network systems. We propose a promising method to check security properties of cryptographic protocols using logic of events theory. The logic is designed around a message automaton with actions for possible protocol steps including generating new nonces, sending and receiving messages, and performing encryption, decryption and digital signature verification actions. We figure out types for the keys, nonces, and messages of the protocol and present novel proof rules and mechanism for protocol actions, temporal reasoning, and a specialized form of invariance rule. It puts no bound on the size of the principal and requires no state space enumeration. Our main theorem guarantees that any well-typed protocol is robustly safe under attack while reasoning only about the actions of honest principals in the protocol.
引用
收藏
页码:519 / +
页数:2
相关论文
共 50 条
  • [21] Model checking security protocols using a logic of belief
    Benerecetti, M
    Giunchiglia, F
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, 2000, 1785 : 519 - 534
  • [22] A verification logic for security protocols based on computational semantics
    Tang, Chao-Jing, 1600, Chinese Institute of Electronics (42):
  • [23] Proving Structural Properties of Sequent Systems in Rewriting Logic
    Olarte, Carlos
    Pimentel, Elaine
    Rocha, Camilo
    REWRITING LOGIC AND ITS APPLICATIONS, WRLA 2018, 2018, 11152 : 115 - 135
  • [24] A temporal logic for proving properties of topologically general executions
    BenEliyahu, R
    Magidor, M
    INFORMATION AND COMPUTATION, 1996, 124 (02) : 127 - 144
  • [25] PROVING TERMINATION OF LOGIC PROGRAMS BY EXPLOITING TERM PROPERTIES
    BOSSI, A
    COCCO, N
    FABRIS, M
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 494 : 153 - 180
  • [26] A logical verification method for security protocols based on linear logic and BAN logic
    Hasebe, K
    Okada, M
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 417 - 440
  • [27] Proving secure properties of cryptographic protocols with knowledge based approach
    Cheng, XC
    Ma, XQ
    Cheng, M
    Huang, SCH
    CONFERENCE PROCEEDINGS OF THE 2005 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE, 2005, : 3 - 9
  • [28] Learning specifications of interaction protocols and business processes and proving their properties
    Alberti, Marco
    Gavanelli, Marco
    Lamma, Evelina
    Riguzzi, Fabrizio
    Storari, Sergio
    INTELLIGENZA ARTIFICIALE, 2011, 5 (01) : 71 - 75
  • [29] A Unified Formal Model for Proving Security and Reliability Properties
    Hu, Wei
    Wu, Lingjuan
    Tai, Yu
    Tan, Jing
    Zhang, Jiliang
    2020 IEEE 29TH ASIAN TEST SYMPOSIUM (ATS), 2020, : 30 - 35
  • [30] Invariant Evaluation through Introspection for Proving Security Properties
    Baiardi, Fabrizio
    Maggiari, Dario
    Sgandurra, Daniele
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (02): : 124 - 132