On Formal Analysis of Cryptographic Protocols and Supporting Tool

被引:0
|
作者
Xiao Meihua [1 ]
Jiang Yun [1 ]
Liu Qiaowei [1 ]
机构
[1] Nanchang Univ, Sch Informat Engn, Nanchang 330031, Peoples R China
关键词
Cryptographic protocols; Formal analysis; Model checking; Logic of algorithm knowledge; Partial order reduction; SECURITY PROTOCOLS; ANALYZER;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cryptographic protocols are crucial for secure communications and networks, distribution systems and electronic commerce. Model checking technique and supporting tool for analyzing cryptographic protocols are discussed. A model checking technique based on logic of algorithm knowledge for cryptographic protocols is proposed, which can specify explicitly the intruder model capabilities. The knowledge completeness of intruder abilities is proved. An efficient verification model generating system is developed based on PDL (Protocols description language) and SPIN/Promela for cryptographic protocols. Some optimization strategies are implemented in the system to reduce the state explosion complexity, such as partial order reduction, syntactic reorder and static analysis. More than ten cryptographic protocols are analyzed and published flaws are rediscovered successfully with the system. The verification system can be used as an efficient and reliable tool for evaluation of the network security.
引用
收藏
页码:223 / 228
页数:6
相关论文
共 50 条
  • [1] A Formal Analysis Method with Reasoning for Cryptographic Protocols
    Yan, Jingchen
    Wagatsuma, Kazunori
    Gao, Hongbiao
    Cheng, Jingde
    [J]. PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 566 - 570
  • [2] Formal Analysis for Cryptographic Protocols on a Trace Semantics
    Jiang, Yun
    Gong, HuaPing
    [J]. INTERNATIONAL CONFERENCE ON FUTURE NETWORKS, PROCEEDINGS, 2009, : 127 - 129
  • [3] Formal testing cryptographic protocols
    Igumnov, VS
    [J]. EDM 2005: International Workshop and Tutorials on Electron Devices and Materials, Proceedings, 2005, : 236 - 237
  • [4] A formal analysis for capturing replay attacks in cryptographic protocols
    Gao, Han
    Bodei, Chiara
    Degano, Pierpaolo
    Nielson, Hanne Riis
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 150 - +
  • [5] A survey on computationally sound formal analysis of cryptographic protocols
    Lei, Xin-Feng
    Song, Shu-Min
    Liu, Wei-Bing
    Xue, Rui
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2014, 37 (05): : 993 - 1016
  • [6] A problem solving mechanism for formal analysis of cryptographic Protocols
    Han, Jihong
    Zhao, Yu
    Wang, Yadi
    Zhou, Zhiyong
    [J]. NEW ADVANCES IN SIMULATION, MODELLING AND OPTIMIZATION (SMO '07), 2007, : 95 - 98
  • [7] Logic-based formal analysis of cryptographic protocols
    Muhammad, Shahabuddin
    Furqan, Zeeshan
    Guha, Ratan K.
    [J]. ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 300 - +
  • [8] A Supporting Tool for Spiral Model of Cryptographic Protocol Design with Reasoning-Based Formal Analysis
    Wagatsuma, Kazunori
    Harada, Tsubasa
    Anze, Shogo
    Goto, Yuichi
    Cheng, Jingde
    [J]. ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURE INFORMATION TECHNOLOGY, VOL 2, 2016, 354 : 25 - 32
  • [9] Educating Cryptography using Formal Security Verification tool for Cryptographic Protocols.
    Okazaki, Hiroyuki
    Shimura, Shogo
    Miyamoto, Tatsuki
    Watanabe, Tatsuki
    Murakami, Yasuyuki
    Futa, Yuichi
    [J]. Computer Software, 2020, 37 (01) : 99 - 113
  • [10] Experimental comparison of automatic tools for the formal analysis of cryptographic protocols
    Cheminod, M.
    Bertolotti, I. Cibrario
    Durante, L.
    Sisto, R.
    Valenzano, A.
    [J]. DEPCOS - RELCOMEX '07: INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, PROCEEDINGS, 2007, : 153 - +