Probabilistic Model Checking of Security Protocols without Perfect Cryptography Assumption

被引:7
|
作者
Siedlecka-Lamch, Olga [1 ]
Kurkowski, Miroslaw [2 ]
Piatkowski, Jacek [1 ]
机构
[1] Czestochowa Tech Univ, Inst Comp & Informat Sci, Czestochowa, Poland
[2] Cardinal Stefan Wyszynski Univ Warsaw, Warsaw, Poland
来源
COMPUTER NETWORKS, CN 2016 | 2016年 / 608卷
关键词
Computer networks security; Security protocols verification; Perfect cryptography assumption; Probabilistic analysis; NETWORKS; TOOL;
D O I
10.1007/978-3-319-39207-3_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents the description of a new, probabilistic approach to model checking of security protocols. The protocol, beyond traditional verification, goes through a phase in which we resign from a perfect cryptography assumption. We assume a certain minimal, but measurable probability of breaking/gaining the cryptographic key, and explore how it affects the execution of the protocol. As part of this work we have implemented a tool, that helps to analyze the probability of interception of sensitive information by the Intruder, depending on the preset parameters (number of communication participants, keys, nonces, the probability of breaking a cipher, etc.). Due to the huge size of the constructed computational spaces, we use parallel computing to search for states that contain the considered properties.
引用
收藏
页码:107 / 117
页数:11
相关论文
共 50 条
  • [21] SAT-based model-checking for security protocols analysis
    Alessandro Armando
    Luca Compagna
    International Journal of Information Security, 2008, 7 : 3 - 32
  • [22] Model checking wireless sensor network security protocols:: TinySec + LEAP
    Tobarra, Llanos
    Cazorla, Diego
    Cuartero, Fernando
    Diaz, Gregorio
    Cambronero, Emilia
    WIRELESS SENSOR AND ACTOR NETWORKS, 2007, : 95 - +
  • [23] Synthesis of attack actions using model checking for the verification of security protocols
    Basagiannis, Stylianos
    Katsaros, Panagiotis
    Pombortsis, Andrew
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (02) : 147 - 161
  • [24] Quantum Cryptography Protocols for IOE Security: A Perspective
    Pradeep, Ch Nikhil
    Rao, M. Kameswara
    Vikas, B. Sai
    ADVANCED INFORMATICS FOR COMPUTING RESEARCH, ICAICR 2019, PT II, 2019, 1076 : 107 - 115
  • [25] Security Analysis of a Digital Twin Framework Using Probabilistic Model Checking
    Shaikh, Eman
    Al-Ali, A. R.
    Muhammad, Shahabuddin
    Mohammad, Nazeeruddin
    Aloul, F.
    IEEE ACCESS, 2023, 11 : 26358 - 26374
  • [26] Security Analysis of NFC Relay Attacks using Probabilistic Model Checking
    Alexiou, Nikolaos
    Basagiannis, Stylianos
    Petridou, Sophia
    2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2014, : 524 - 529
  • [27] Probabilistic Model Checking
    Baier, Christel
    DEPENDABLE SOFTWARE SYSTEMS ENGINEERING, 2016, 45 : 1 - 23
  • [28] From perfect secrecy to perfect safety & security:Cryptography-based analysis of endogenous security
    Liang Jin
    Xiaoyan Hu
    Jiangxing Wu
    SecurityandSafety, 2023, 2 (03) : 4 - 19
  • [29] An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols
    Armando, Alessandro
    Compagna, Luca
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 125 (01) : 91 - 108
  • [30] Modelling and checking timed authentication of security protocols
    Jakubowska, Gizela
    Penczek, Wojciech
    FUNDAMENTA INFORMATICAE, 2007, 79 (3-4) : 363 - 378