An Approach for Formal Verification of Authentication Protocols

被引:0
|
作者
Mironov, A. M. [1 ,2 ]
机构
[1] Innopolis Univ, Innopolis 420500, Russia
[2] Lomonosov Moscow State Univ, Moscow 119991, Russia
关键词
authentication protocols; processes; verification;
D O I
10.1134/S1995080222050195
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Authentication protocols (APs) are one of the most important components of secure information systems. Authentication Protocols are distributed algorithms intended for secure authentication of users in an insecure environment. They are used, for example, in electronic payments, electronic voting procedures, systems of confidential data processing, etc. Errors in APs can bring to great financial and social damage, therefore it is necessary to use mathematical methods to substantiate the correctness and safety of APs. In this paper, a process model of APs is presented, which allows one to formally describe APs and their properties. It is shown how to solve the problems of verification of APs on the base of this model.
引用
收藏
页码:443 / 454
页数:12
相关论文
共 50 条
  • [1] An Approach for Formal Verification of Authentication Protocols
    A. M. Mironov
    [J]. Lobachevskii Journal of Mathematics, 2022, 43 : 443 - 454
  • [2] Formal automatic verification of authentication cryptographic protocols
    Debbabi, M
    Mejri, M
    Tawbi, N
    Yahmadi, I
    [J]. FIRST IEEE INTERNATIONAL CONFERENCE ON FORMAL ENGINEERING METHODS, PROCEEDINGS, 1997, : 50 - 59
  • [3] Communication space reduction for formal verification of secure authentication protocols
    Kim, K
    Abraham, JA
    [J]. THIRD INTERNATIONAL WORKSHOP ON ADVANCED ISSUES OF E-COMMERCE AND WEB-BASED INFORMATION SYSTEMS, PROCEEDINGS, 2001, : 225 - 227
  • [5] Knowledge structure approach to verification of authentication protocols
    Su, KL
    Lü, GF
    Chen, QL
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2005, 48 (04): : 513 - 532
  • [6] Knowledge structure approach to verification of authentication protocols
    Kaile Su
    Guanfeng Lü
    Qingliang Chen
    [J]. Science in China Series F: Information Sciences, 2005, 48 : 513 - 532
  • [7] Property verification for authentication protocols
    Indiradevi, K
    Nair, VSS
    Abraham, JA
    [J]. ASSET'99: 1999 IEEE SYMPOSIUM ON APPLICATION-SPECIFIC SYSTEMS AND SOFTWARE ENGINEERING & TECHNOLOGY - PROCEEDINGS, 1999, : 82 - 85
  • [8] VERIFICATION AND MODELING OF AUTHENTICATION PROTOCOLS
    HAUSER, RC
    LEE, ES
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1992, 648 : 141 - 154
  • [9] An approach to the formal verification of the three-principal security protocols
    Zhang, YQ
    Liu, XY
    Feng, DG
    [J]. SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 163 - 169
  • [10] Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols
    Duguma, Daniel Gerbi
    You, Ilsun
    Gebremariam, Yonas Engida
    Kim, Jiyoon
    [J]. SENSORS, 2021, 21 (24)