An Approach for Formal Verification of Authentication Protocols

被引:0
|
作者
Mironov, A. M. [1 ,2 ]
机构
[1] Innopolis Univ, Innopolis 420500, Russia
[2] Lomonosov Moscow State Univ, Moscow 119991, Russia
关键词
authentication protocols; processes; verification;
D O I
10.1134/S1995080222050195
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Authentication protocols (APs) are one of the most important components of secure information systems. Authentication Protocols are distributed algorithms intended for secure authentication of users in an insecure environment. They are used, for example, in electronic payments, electronic voting procedures, systems of confidential data processing, etc. Errors in APs can bring to great financial and social damage, therefore it is necessary to use mathematical methods to substantiate the correctness and safety of APs. In this paper, a process model of APs is presented, which allows one to formally describe APs and their properties. It is shown how to solve the problems of verification of APs on the base of this model.
引用
收藏
页码:443 / 454
页数:12
相关论文
共 50 条
  • [41] On the formal modeling of inductive verification for cryptographical protocols
    Li, Yongjian
    Song, Xiaoyu
    Li, Xiaojuan
    [J]. 2012 13TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS, AND TECHNOLOGIES (PDCAT 2012), 2012, : 201 - 206
  • [42] Formal Verification of Security Protocols Using Spin
    Chen, Shengbo
    Fu, Hao
    Miao, Huaikou
    [J]. 2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2016, : 637 - 642
  • [43] Specification and formal verification of interconnect bus protocols
    Ivanov, L
    Nunna, R
    [J]. PROCEEDINGS OF THE 43RD IEEE MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS I-III, 2000, : 378 - 382
  • [44] Towards formal verification of IoT protocols: A Review
    Hofer-Schmitz, Katharina
    Stojanovic, Branka
    [J]. COMPUTER NETWORKS, 2020, 174
  • [45] Formal design of efficient authentication and key agreement protocols
    Jacobson, G
    [J]. SECURE INFORMATION NETWORKS: COMMUNICATIONS AND MULTIMEDIA SECURITY, 1999, 23 : 96 - 113
  • [46] USE OF A FORMAL DESCRIPTION TECHNIQUE IN THE SPECIFICATION OF AUTHENTICATION PROTOCOLS
    VARADHARAJAN, V
    [J]. COMPUTER STANDARDS & INTERFACES, 1990, 9 (03) : 203 - 215
  • [47] Model-driven approach supporting formal verification for web service composition protocols
    Dumez, C.
    Bakhouya, M.
    Gaber, J.
    Wack, M.
    Lorenz, P.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (04) : 1102 - 1115
  • [48] Fast and Automatic Verification of Authentication and Key Exchange Protocols
    Ota, Haruki
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN P2P SYSTEMS (AP2PS 2010), 2010, : 7 - 13
  • [49] Fast and Automatic Verification of Authentication and Key Exchange Protocols
    Ota, Haruki
    Kiyomoto, Shinsaku
    Miyake, Yutaka
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (04): : 1 - 13
  • [50] Towards automatic verification of authentication protocols on an unbounded network
    Heather, J
    Schneider, S
    [J]. 13TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2000, : 132 - 143