Proving properties of security protocols by induction

被引:78
|
作者
Paulson, LC
机构
关键词
D O I
10.1109/CSFW.1997.596788
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Informal justifications of security protocols involve arguing backwards that various events are impossible. Inductive definitions can make such arguments rigorous, The resulting proofs are complicated, bug can be generated reasonably quickly using the proof tool Isabelle/HOL. There is no restriction to finite-state systems and the approach is not based on belief logics. Protocols are inductively defined as sets of traces, traces, which may involve many interleaved protocol runs. Protocol descriptions model accidental key losses as well as attacks. The model spy can send spoof messages made up of components decrypted from previous traffic. Several key distribution protocols have been studied including Needham-Schroeder, Yahalom and Otway-Rees. The method applies to both symmetric-key and public-key protocols. A new attack has been discovered in a variant of Otway-Rees (already broken by Mao and Boyd). Assertions concerning secrecy and authenticity have been proved.
引用
收藏
页码:70 / 83
页数:14
相关论文
共 50 条
  • [1] Logic of Events for Proving Security Properties of Protocols
    Xiao, Meihua
    Bickford, Mark
    WISM: 2009 INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, : 519 - +
  • [2] Proving security protocols correct
    Paulson, Lawrence C.
    Proceedings - Symposium on Logic in Computer Science, 1999, : 370 - 381
  • [3] Exploiting Symmetries When Proving Equivalence Properties for Security Protocols
    Cheval, Vincent
    Kremer, Steve
    Rakotonirina, Itsaka
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 905 - 922
  • [4] Strand spaces: proving security protocols correct
    MITRE Corp, Bedford, MA, United States
    J Computer Secur, 2 (191-230):
  • [5] LoET-E: A Refined Theory for Proving Security Properties of Cryptographic Protocols
    Song, Jiawen
    Xiao, Meihua
    Yang, Ke
    Wang, Xizhong
    Zhong, Xiaomei
    IEEE ACCESS, 2019, 7 : 59871 - 59883
  • [6] PROVING OPEN PROPERTIES BY INDUCTION
    RAOULT, JC
    INFORMATION PROCESSING LETTERS, 1988, 29 (01) : 19 - 23
  • [7] Formalizing and Proving a Typing Result for Security Protocols in Isabelle/HOL
    Hess, Andreas Viktor
    Modersheim, Sebastian
    2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 451 - 463
  • [8] Proving security protocols with model checkers by data independence techniques
    Roscoe, AW
    11TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP - PROCEEDINGS, 1998, : 84 - 95
  • [9] A framework for proving the security of data transmission protocols in sensor network
    Wen, Mi
    Dong, Ling
    Zheng, Yanfei
    Chen, Kefei
    INTELLIGENCE AND SECURITY INFORMATICS, 2007, 4430 : 288 - +
  • [10] Security protocols and their properties
    Abadi, M
    FOUNDATIONS OF SECURE COMPUTATION, 2000, 175 : 39 - 60