Strategy for verifying security protocols with unbounded message size

被引:2
|
作者
Chevalier Y. [1 ]
Vigneron L. [1 ]
机构
[1] LORIA, UHP, 54506 Vandoeuvre-les-Nancy Cedex, Campus Scientifique
关键词
Automatic strategies; Flaw detection; Intruder model; Security protocols; Verification;
D O I
10.1023/B:AUSE.0000017741.10347.9b
中图分类号
学科分类号
摘要
We present a system for automatically verifying cryptographic protocols. This system manages the knowledge of principals and checks if the protocol is runnable. In this case, it outputs a set of rewrite rules describing the protocol itself, the strategy of an intruder, and the goal to achieve. The protocol specification language permits to express commonly used descriptions of properties (authentication, short term secrecy, and so on) as well as complex data structures such as tables and hash functions. The generated rewrite rules can be used for detecting flaws with various systems: theorem proving in first-order logic, on-the-fly model-checking, or SAT-based state exploration. These three techniques are being experimented in the European Union project AVISPA. The aim of this paper is to describe the analysis process. First, we describe the major steps of the compilation process of a protocol description by our tool Casrul. Then, we describe the behavior of the intruder defined for the analysis. Our intruder is based on a lazy strategy, and is implemented as rewrite rules for the theorem prover daTac. Another advantage of our model is that it permits to handle parallel executions of the protocol and composition of keys. And for sake of completeness, it is possible, using Casrul, to either specify an unbounded number of executions or an unbounded message size. The combination of Casrul and daTac has permitted successful studying of various protocols, such as NSPK, EKE, RSA, Neumann-Stubblebine, Kao-Chow and Otway-Rees. We detail some of these examples in this paper. We are now studying the SET protocol and have already very encouraging results.
引用
收藏
页码:141 / 166
页数:25
相关论文
共 50 条
  • [1] Compiling and verifying security protocols
    Jacquemard, F
    Rusinowitch, M
    Vigneron, L
    LOGIC FOR PROGRAMMING AND AUTOMATED REASONING, PROCEEDINGS, 2000, 1955 : 131 - 160
  • [2] Verifying security protocols with Brutus
    Clarke, EM
    Jha, S
    Marrero, W
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2000, 9 (04) : 443 - 487
  • [3] Verifying layered security protocols
    Gibson-Robinson, Thomas
    Kamil, Allaa
    Lowe, Gavin
    JOURNAL OF COMPUTER SECURITY, 2015, 23 (03) : 259 - 307
  • [4] Verifying the independence of security protocols
    Bela, Genge
    Ignat, Iosif
    ICCP 2007: IEEE 3RD INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2007, : 155 - +
  • [5] Verifying Security Properties in Unbounded Multiagent Systems
    Boureanu, Ioana
    Kouvaros, Panagiotis
    Lomuscio, Alessio
    AAMAS'16: PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS, 2016, : 1209 - 1217
  • [6] Verifying security protocols by knowledge analysis
    School of Systems Engineering, The University of Reading, Reading, United Kingdom
    不详
    不详
    Int. J. Secur. Netw., 2008, 3 (183-192): : 183 - 192
  • [7] Verifying Parameterized Timed Security Protocols
    Li, Li
    Sun, Jun
    Liu, Yang
    Dong, Jin Song
    FM 2015: FORMAL METHODS, 2015, 9109 : 342 - 359
  • [8] TAuth: Verifying Timed Security Protocols
    Li, Li
    Sun, Jun
    Liu, Yang
    Dong, Jin Song
    FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2014, 2014, 8829 : 300 - 315
  • [9] Verifying security protocols: An application of CSP
    Schneider, S
    Delicata, R
    COMMUNICATING SEQUENTIAL PROCESSES: THE FIRST 25 YEARS, 2005, 3525 : 243 - 263
  • [10] Verifying Implementations of Security Protocols by Refinement
    Polikarpova, Nadia
    Moskal, Michal
    VERIFIED SOFTWARE: THEORIES, TOOLS, EXPERIMENTS, 2012, 7152 : 50 - +