Probabilistic Model Checking of Security Protocols without Perfect Cryptography Assumption

被引:7
|
作者
Siedlecka-Lamch, Olga [1 ]
Kurkowski, Miroslaw [2 ]
Piatkowski, Jacek [1 ]
机构
[1] Czestochowa Tech Univ, Inst Comp & Informat Sci, Czestochowa, Poland
[2] Cardinal Stefan Wyszynski Univ Warsaw, Warsaw, Poland
来源
COMPUTER NETWORKS, CN 2016 | 2016年 / 608卷
关键词
Computer networks security; Security protocols verification; Perfect cryptography assumption; Probabilistic analysis; NETWORKS; TOOL;
D O I
10.1007/978-3-319-39207-3_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents the description of a new, probabilistic approach to model checking of security protocols. The protocol, beyond traditional verification, goes through a phase in which we resign from a perfect cryptography assumption. We assume a certain minimal, but measurable probability of breaking/gaining the cryptographic key, and explore how it affects the execution of the protocol. As part of this work we have implemented a tool, that helps to analyze the probability of interception of sensitive information by the Intruder, depending on the preset parameters (number of communication participants, keys, nonces, the probability of breaking a cipher, etc.). Due to the huge size of the constructed computational spaces, we use parallel computing to search for states that contain the considered properties.
引用
收藏
页码:107 / 117
页数:11
相关论文
共 50 条
  • [31] Model checking wireless sensor network security protocols: TinySec + LEAP + TinyPK
    Llanos Tobarra
    Diego Cazorla
    Fernando Cuartero
    Gregorio Díaz
    Emilia Cambronero
    Telecommunication Systems, 2009, 40 : 91 - 99
  • [32] On perfect and adaptive security in exposure-resilient cryptography
    Dodis, Y
    Sahai, A
    Smith, A
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2001, PROCEEDINGS, 2001, 2045 : 301 - 324
  • [33] Secure Cryptography Testbed Implementation for SCADA Protocols Security
    Shahzad, AAmir
    Musa, Shahrulniza
    Aborujilah, Abdulaziz
    Irfan, Muhammad
    2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2014, : 315 - 320
  • [34] Model checking contractual protocols
    Daskalopulu, A
    LEGAL KNOWLEDGE AND INFORMATION SYSTEMS, 2000, 64 : 35 - 47
  • [35] Model checking of authentication protocols
    Xu, Wei-Wen
    Lu, Xin-Da
    Jisuanji Xuebao/Chinese Journal of Computers, 2003, 26 (02): : 195 - 201
  • [36] Model checking guarded protocols
    Emerson, EA
    Kahlon, V
    18TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2003, : 361 - 370
  • [37] Checking security properties by model checking
    De Francesco, N
    Lettieri, G
    SOFTWARE TESTING VERIFICATION & RELIABILITY, 2003, 13 (03): : 181 - 196
  • [38] Probabilistic Aspects: Checking Security in an Imperfect World
    Hankin, Chris
    Nielson, Flemming
    Nielson, Hanne Riis
    TRUSTWORTHY GLOBAL COMPUTING, 2010, 6084 : 348 - +
  • [39] Assumption–Commitment Support for CSP Model Checking
    Nick Moffat
    Michael Goldsmith
    Journal of Automated Reasoning, 2008, 41 : 365 - 398
  • [40] Compiling Probabilistic Model Checking into Probabilistic Planning
    Klauck, Michaela
    Steinmetz, Marcel
    Hoffmann, Joerg
    Hermanns, Holger
    TWENTY-EIGHTH INTERNATIONAL CONFERENCE ON AUTOMATED PLANNING AND SCHEDULING (ICAPS 2018), 2018, : 150 - 154