Automatic analyzer for security protocol verification

被引:0
|
作者
Li, Xie-Hua [1 ]
Yang, Shu-Tang [1 ]
Li, Jian-Hua [1 ]
Zhu, Hong-Wen [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Elect Engn, Shanghai 200240, Peoples R China
关键词
improved authentication tests model; message type; strand space model; protocol-proving algorithm; Neuman-Stubblebine protocol;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We propose a new efficient automatic algorithm for security protocol verification. It is based on an improved authentication tests model. which enhances the original authentication tests by introducing the notion of message type and checking mechanism. This automatic algorithm can provide the precise proof of authentication and secrecy properties of security protocols. The improved authentication tests model is an extension of the original authentication tests, which overcomes the deficiency of the original ones in proving symmetric key protocols. By integrating the message type and checking mechanism, it is easy to identify the originator of the uniquely originating value, and detect the message replayed attack. in addition, this automatic algorithm also exploits the forward proving strategy, which only generates limited states during the verification procedure run and avoids the state spaces explosion. When the valuation procedure terminates, it outputs either the whole proving process or the potential flaws in the security protocol.
引用
收藏
页码:104 / 109
页数:6
相关论文
共 50 条
  • [1] Automatic Verification of Security of OpenID Connect Protocol with ProVerif
    Lu, Jintian
    Zhang, Jinli
    Li, Jing
    Wan, Zhongyu
    Meng, Bo
    ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING, 2017, 1 : 209 - 220
  • [2] Slede: Framework for Automatic Verification of Sensor Network Security Protocol Implementations
    Hanna, Youssef
    Rajan, Hridesh
    2009 31ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, COMPANION VOLUME, 2009, : 427 - 428
  • [3] Automatic verification of security properties of remote internet voting protocol in symbolic model
    Meng B.
    Huang W.
    Qin J.
    Information Technology Journal, 2010, 9 (08) : 1521 - 1556
  • [4] Design of an Efficient Security Protocol Analyzer
    Kiyomoto, Shinsaku
    Ota, Haruki
    Tanaka, Toshiaki
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (06): : 69 - 82
  • [5] Abstractions for security protocol verification
    Binh Thanh Nguyen
    Sprenger, Christoph
    Cremers, Cas
    JOURNAL OF COMPUTER SECURITY, 2018, 26 (04) : 459 - 508
  • [6] Abstractions for security protocol verification
    Nguyen, Binh Thanh
    Sprenger, Christoph
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 9036 : 196 - 215
  • [7] Language generation and verification in the NRL protocol analyzer
    Meadows, C
    9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 48 - 61
  • [8] Automatic verification of security properties in remote internet voting protocol with applied Pi calculus
    Meng B.
    Huang W.
    Li Z.
    Wang D.
    International Journal of Digital Content Technology and its Applications, 2010, 4 (07)
  • [9] Automatic Verification of Simulatability in Security Protocols
    Araragi, Tadashi
    Pereira, Olivier
    FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 275 - +
  • [10] Automatic verification of correspondences for security protocols
    Blanchet, Bruno
    JOURNAL OF COMPUTER SECURITY, 2009, 17 (04) : 363 - 434