Probabilistic Model Checking of Security Protocols without Perfect Cryptography Assumption

被引:7
|
作者
Siedlecka-Lamch, Olga [1 ]
Kurkowski, Miroslaw [2 ]
Piatkowski, Jacek [1 ]
机构
[1] Czestochowa Tech Univ, Inst Comp & Informat Sci, Czestochowa, Poland
[2] Cardinal Stefan Wyszynski Univ Warsaw, Warsaw, Poland
来源
COMPUTER NETWORKS, CN 2016 | 2016年 / 608卷
关键词
Computer networks security; Security protocols verification; Perfect cryptography assumption; Probabilistic analysis; NETWORKS; TOOL;
D O I
10.1007/978-3-319-39207-3_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents the description of a new, probabilistic approach to model checking of security protocols. The protocol, beyond traditional verification, goes through a phase in which we resign from a perfect cryptography assumption. We assume a certain minimal, but measurable probability of breaking/gaining the cryptographic key, and explore how it affects the execution of the protocol. As part of this work we have implemented a tool, that helps to analyze the probability of interception of sensitive information by the Intruder, depending on the preset parameters (number of communication participants, keys, nonces, the probability of breaking a cipher, etc.). Due to the huge size of the constructed computational spaces, we use parallel computing to search for states that contain the considered properties.
引用
收藏
页码:107 / 117
页数:11
相关论文
共 50 条
  • [1] LTL model checking for security Protocols
    Armando, Alessandro
    Carbone, Roberto
    Compagna, Luca
    20TH IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSFS20), PROCEEDINGS, 2007, : 385 - +
  • [2] Model Checking Indistinguishability of Randomized Security Protocols
    Bauer, Matthew S.
    Chadha, Rohit
    Sistla, A. Prasad
    Viswanathan, Mahesh
    COMPUTER AIDED VERIFICATION, CAV 2018, PT II, 2018, 10982 : 117 - 135
  • [3] LDYIS: a Framework for Model Checking Security Protocols
    Lomuscio, Alessio
    Penczek, Wojciech
    FUNDAMENTA INFORMATICAE, 2008, 85 (1-4) : 359 - 375
  • [4] Parallel Bounded Model Checking of Security Protocols
    Kurkowski, Miroslaw
    Siedlecka-Lamch, Olga
    Szymoniak, Sabina
    Piech, Henryk
    PARALLEL PROCESSING AND APPLIED MATHEMATICS (PPAM 2013), PT I, 2014, 8384 : 224 - 234
  • [5] LTL model-checking for security protocols
    Carbone, Roberto
    AI COMMUNICATIONS, 2011, 24 (03) : 281 - 283
  • [6] Verifying Team Formation Protocols with Probabilistic Model Checking
    Chen, Taolue
    Kwiatkowska, Marta
    Parker, David
    Simaitis, Aistis
    COMPUTATIONAL LOGIC IN MULTI-AGENT SYSTEMS, 2011, 6814 : 190 - 207
  • [7] The Modeling Library of Eavesdropping Methods in Quantum Cryptography Protocols by Model Checking
    Yang, Fan
    Yang, Guowu
    Hao, Yujie
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2016, 55 (07) : 3414 - 3427
  • [8] The Modeling Library of Eavesdropping Methods in Quantum Cryptography Protocols by Model Checking
    Fan Yang
    Guowu Yang
    Yujie Hao
    International Journal of Theoretical Physics, 2016, 55 : 3414 - 3427
  • [9] An intruder model with message inspection for model checking security protocols
    Basagiannis, Stylianos
    Katsaros, Panagiotis
    Pombortsis, Andrew
    COMPUTERS & SECURITY, 2010, 29 (01) : 16 - 34
  • [10] Model checking security protocols using a logic of belief
    Benerecetti, M
    Giunchiglia, F
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, 2000, 1785 : 519 - 534