Strategy for verifying security protocols with unbounded message size

被引:2
|
作者
Chevalier Y. [1 ]
Vigneron L. [1 ]
机构
[1] LORIA, UHP, 54506 Vandoeuvre-les-Nancy Cedex, Campus Scientifique
关键词
Automatic strategies; Flaw detection; Intruder model; Security protocols; Verification;
D O I
10.1023/B:AUSE.0000017741.10347.9b
中图分类号
学科分类号
摘要
We present a system for automatically verifying cryptographic protocols. This system manages the knowledge of principals and checks if the protocol is runnable. In this case, it outputs a set of rewrite rules describing the protocol itself, the strategy of an intruder, and the goal to achieve. The protocol specification language permits to express commonly used descriptions of properties (authentication, short term secrecy, and so on) as well as complex data structures such as tables and hash functions. The generated rewrite rules can be used for detecting flaws with various systems: theorem proving in first-order logic, on-the-fly model-checking, or SAT-based state exploration. These three techniques are being experimented in the European Union project AVISPA. The aim of this paper is to describe the analysis process. First, we describe the major steps of the compilation process of a protocol description by our tool Casrul. Then, we describe the behavior of the intruder defined for the analysis. Our intruder is based on a lazy strategy, and is implemented as rewrite rules for the theorem prover daTac. Another advantage of our model is that it permits to handle parallel executions of the protocol and composition of keys. And for sake of completeness, it is possible, using Casrul, to either specify an unbounded number of executions or an unbounded message size. The combination of Casrul and daTac has permitted successful studying of various protocols, such as NSPK, EKE, RSA, Neumann-Stubblebine, Kao-Chow and Otway-Rees. We detail some of these examples in this paper. We are now studying the SET protocol and have already very encouraging results.
引用
收藏
页码:141 / 166
页数:25
相关论文
共 50 条
  • [31] Verification of Security Protocols with Lists: From Length One to Unbounded Length
    Paiola, Miriam
    Blanchet, Bruno
    PRINCIPLES OF SECURITY AND TRUST, POST 2012, 2012, 7215 : 69 - 88
  • [32] Multi-input Functional Encryption with Unbounded-Message Security
    Goyal, Vipul
    Jain, Aayush
    O'Neill, Adam
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 : 531 - 556
  • [33] Abstraction by Set-Membership Verifying Security Protocols and Web Services with Databases
    Modersheim, Sebastian A.
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 351 - 360
  • [34] SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies
    Xiong, Yan
    Su, Cheng
    Huang, Wenchao
    Miao, Fuyou
    Wang, Wansen
    Ouyang, Hengyi
    PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 253 - 270
  • [35] Verifying mobile ad-hoc security routing protocols with type inference
    Li, Qin
    Zeng, Qing-Kai
    Ruan Jian Xue Bao/Journal of Software, 2009, 20 (10): : 2822 - 2833
  • [36] An intruder model with message inspection for model checking security protocols
    Basagiannis, Stylianos
    Katsaros, Panagiotis
    Pombortsis, Andrew
    COMPUTERS & SECURITY, 2010, 29 (01) : 16 - 34
  • [37] VERIFYING SECURITY
    CHEHEYL, MH
    GASSER, M
    HUFF, GA
    MILLEN, JK
    COMPUTING SURVEYS, 1981, 13 (03) : 279 - 339
  • [38] Verifying Accountability for Unbounded Sets of Participants
    Morio, Kevin
    Kuennemann, Robert
    2021 IEEE 34TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2021), 2021, : 173 - 188
  • [39] Message packing as a performance enhancement strategy with application to the totem protocols
    Narasimhan, P
    Moser, LE
    MelliarSmith, PM
    IEEE GLOBECOM 1996 - CONFERENCE RECORD, VOLS 1-3: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 649 - 653
  • [40] Verifying norm compliancy of protocols
    Aldewereld, Huib
    Vazquez-Salceda, Javier
    Dignum, Frank
    Meyer, John-Jules Ch.
    COORDINATION, ORGANIZATIONS, INSTITUTIONS, AND NORMS IN MULTI-AGENT SYSTEMS, 2006, 3913 : 231 - 245