Strategy for verifying security protocols with unbounded message size

被引:2
|
作者
Chevalier Y. [1 ]
Vigneron L. [1 ]
机构
[1] LORIA, UHP, 54506 Vandoeuvre-les-Nancy Cedex, Campus Scientifique
关键词
Automatic strategies; Flaw detection; Intruder model; Security protocols; Verification;
D O I
10.1023/B:AUSE.0000017741.10347.9b
中图分类号
学科分类号
摘要
We present a system for automatically verifying cryptographic protocols. This system manages the knowledge of principals and checks if the protocol is runnable. In this case, it outputs a set of rewrite rules describing the protocol itself, the strategy of an intruder, and the goal to achieve. The protocol specification language permits to express commonly used descriptions of properties (authentication, short term secrecy, and so on) as well as complex data structures such as tables and hash functions. The generated rewrite rules can be used for detecting flaws with various systems: theorem proving in first-order logic, on-the-fly model-checking, or SAT-based state exploration. These three techniques are being experimented in the European Union project AVISPA. The aim of this paper is to describe the analysis process. First, we describe the major steps of the compilation process of a protocol description by our tool Casrul. Then, we describe the behavior of the intruder defined for the analysis. Our intruder is based on a lazy strategy, and is implemented as rewrite rules for the theorem prover daTac. Another advantage of our model is that it permits to handle parallel executions of the protocol and composition of keys. And for sake of completeness, it is possible, using Casrul, to either specify an unbounded number of executions or an unbounded message size. The combination of Casrul and daTac has permitted successful studying of various protocols, such as NSPK, EKE, RSA, Neumann-Stubblebine, Kao-Chow and Otway-Rees. We detail some of these examples in this paper. We are now studying the SET protocol and have already very encouraging results.
引用
收藏
页码:141 / 166
页数:25
相关论文
共 50 条
  • [11] The Simplified Inductive Approach to Verifying Security Protocols
    Wang Juan
    Zhou Yajie
    Mang Huanguo
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 523 - 526
  • [12] A Z based approach to verifying security protocols
    Long, BW
    Fidge, CJ
    Cerone, A
    FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2003, 2885 : 375 - 395
  • [13] Verifying second-level security protocols
    Bella, G
    Longo, C
    Paulson, LC
    THEOREM PROVING IN HIGHER ORDER LOGICS, PROCEEDINGS, 2003, 2758 : 352 - 366
  • [14] Verifying security Protocols modelled by networks of automata
    Kurkowski, Miroslaw
    Penczek, Wojciech
    FUNDAMENTA INFORMATICAE, 2007, 79 (3-4) : 453 - 471
  • [15] Advancing the Automation Capability of Verifying Security Protocols
    Wang, Wansen
    Huang, Wenchao
    Meng, Zhaoyi
    Xiong, Yan
    Su, Cheng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5059 - 5070
  • [16] An intruder model for verifying liveness in security protocols
    Department of Computer Science, University of Twente, P.O. Box 217, 7500 AE Enschede, Netherlands
    不详
    Proc. Fourth ACM Workshop Formal Methods Secur. Eng. FMSE Conf.Comput. Commun. Secur., 2006, (23-32):
  • [17] Knowledge Based Approach for Mechanically Verifying Security Protocols
    Ma, Xiaoqi
    Cheng, Xiaochun
    McCrindle, Rachel
    19TH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI-05), 2005, : 1572 - 1573
  • [18] Formally verifying security protocols built on watermarking and jamming
    Costa, Gabriele
    Degano, Pierpaolo
    Galletta, Letterio
    Soderi, Simone
    COMPUTERS & SECURITY, 2023, 128
  • [19] Modeling and Verifying Security Protocols Using UML 2
    Smith, Sandra
    Beaulieu, Alain
    Phillips, W. Greg
    2011 IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON 2011), 2011, : 72 - 79
  • [20] Modeling and Verifying Time Sensitive Security Protocols with Constraints
    Zhou, Ti
    Li, Mengjun
    Li, Zhoujun
    Chen, Huowang
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 212 (0C) : 103 - 118