Probabilistic Model Checking of Security Protocols without Perfect Cryptography Assumption

被引:7
|
作者
Siedlecka-Lamch, Olga [1 ]
Kurkowski, Miroslaw [2 ]
Piatkowski, Jacek [1 ]
机构
[1] Czestochowa Tech Univ, Inst Comp & Informat Sci, Czestochowa, Poland
[2] Cardinal Stefan Wyszynski Univ Warsaw, Warsaw, Poland
来源
COMPUTER NETWORKS, CN 2016 | 2016年 / 608卷
关键词
Computer networks security; Security protocols verification; Perfect cryptography assumption; Probabilistic analysis; NETWORKS; TOOL;
D O I
10.1007/978-3-319-39207-3_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents the description of a new, probabilistic approach to model checking of security protocols. The protocol, beyond traditional verification, goes through a phase in which we resign from a perfect cryptography assumption. We assume a certain minimal, but measurable probability of breaking/gaining the cryptographic key, and explore how it affects the execution of the protocol. As part of this work we have implemented a tool, that helps to analyze the probability of interception of sensitive information by the Intruder, depending on the preset parameters (number of communication participants, keys, nonces, the probability of breaking a cipher, etc.). Due to the huge size of the constructed computational spaces, we use parallel computing to search for states that contain the considered properties.
引用
收藏
页码:107 / 117
页数:11
相关论文
共 50 条
  • [41] Approximate probabilistic model checking
    Hérault, T
    Lassaigne, R
    Magniette, F
    Peyronnet, S
    VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, PROCEEDINGS, 2004, 2937 : 73 - 84
  • [42] Probabilistic Model Checking for Biology
    Kwiatkowska, Marta
    Thachuk, Chris
    SOFTWARE SYSTEMS SAFETY, 2014, 36 : 165 - 189
  • [43] Distributional Probabilistic Model Checking
    Elsayed-Aly, Ingy
    Parker, David
    Feng, Lu
    NASA FORMAL METHODS, NFM 2024, 2024, 14627 : 57 - 75
  • [44] The Probabilistic Model Checking Landscape
    Katoen, Joost-Pieter
    PROCEEDINGS OF THE 31ST ANNUAL ACM-IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE (LICS 2016), 2016, : 31 - 45
  • [45] Counterexamples in probabilistic model checking
    Han, Tingting
    Katoen, Joost-Pieter
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PROCEEDINGS, 2007, 4424 : 72 - +
  • [46] Model checking the probabilistic π-calculus
    Norman, Gethin
    Palamidessi, Catuscia
    Parker, David
    Wu, Peng
    FOURTH INTERNATIONAL CONFERENCE ON THE QUANTITATIVE EVALUATION OF SYSTEMS, 2007, : 169 - +
  • [47] Probabilistic Model Checking of AODV
    Kamali, Mojgan
    Katoen, Joost-Pieter
    QUANTITATIVE EVALUATION OF SYSTEMS (QEST 2020), 2020, 12289 : 54 - 73
  • [48] Probabilistic Model Checking and Autonomy
    Kwiatkowska, Marta
    Norman, Gethin
    Parker, David
    ANNUAL REVIEW OF CONTROL ROBOTICS AND AUTONOMOUS SYSTEMS, 2022, 5 : 385 - 410
  • [49] Probabilistic convergence analysis of the stochastic particle swarm optimization model without the stagnation assumption
    Hu, Difeng
    Qiu, Xudong
    Liu, Ying
    Zhou, Xiangyang
    INFORMATION SCIENCES, 2021, 547 : 996 - 1007
  • [50] Security analysis of electronic payment protocols based on quantum cryptography
    Liu, Yi
    Liu, Xingtong
    Wang, Jian
    Zhang, Lei
    Tang, Chaojing
    2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2017, : 1709 - 1712