Proving properties of security protocols by induction

被引:78
|
作者
Paulson, LC
机构
关键词
D O I
10.1109/CSFW.1997.596788
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Informal justifications of security protocols involve arguing backwards that various events are impossible. Inductive definitions can make such arguments rigorous, The resulting proofs are complicated, bug can be generated reasonably quickly using the proof tool Isabelle/HOL. There is no restriction to finite-state systems and the approach is not based on belief logics. Protocols are inductively defined as sets of traces, traces, which may involve many interleaved protocol runs. Protocol descriptions model accidental key losses as well as attacks. The model spy can send spoof messages made up of components decrypted from previous traffic. Several key distribution protocols have been studied including Needham-Schroeder, Yahalom and Otway-Rees. The method applies to both symmetric-key and public-key protocols. A new attack has been discovered in a variant of Otway-Rees (already broken by Mao and Boyd). Assertions concerning secrecy and authenticity have been proved.
引用
收藏
页码:70 / 83
页数:14
相关论文
共 50 条
  • [21] Using Backward Induction Techniques in (Timed) Security Protocols Verification
    Kurkowski, Miroslaw
    Siedlecka-Lamch, Olga
    Dudek, Pawel
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 265 - 276
  • [22] SPECIFYING AND PROVING COMMUNICATION CLOSEDNESS IN PROTOCOLS
    JANSSEN, W
    ZWIERS, J
    PROTOCOL SPECIFICATION, TESTING AND VERIFICATION, XIII, 1993, 16 : 323 - 339
  • [23] A Method for Proving Unlinkability of Stateful Protocols
    Baelde, David
    Delaune, Stephanie
    Moreau, Solene
    2020 IEEE 33RD COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2020), 2020, : 169 - 183
  • [24] Bounding messages for free in security protocols - extension to various security properties
    Arapinis, Myrto
    Duflot, Marie
    INFORMATION AND COMPUTATION, 2014, 239 : 182 - 215
  • [25] Formalizing and Proving Privacy Properties of Voting Protocols Using Alpha-Beta Privacy
    Gondron, Sebastien
    Modersheim, Sebastian
    COMPUTER SECURITY - ESORICS 2019, PT I, 2019, 11735 : 535 - 555
  • [26] Formal Reasoning about Physical Properties of Security Protocols
    Basin, David
    Capkun, Srdjan
    Schaller, Patrick
    Schmidt, Benedikt
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (02)
  • [27] Handling algebraic properties in automatic analysis of security protocols
    Boichut, Y.
    Heam, P. -C.
    Kouchnarenko, O.
    THEORETICAL ASPECTS OF COMPUTING - ICTAC 2006, 2006, 4281 : 153 - 167
  • [28] Using SPIN to verify security properties of cryptographic protocols
    Maggi, P
    Sisto, R
    MODEL CHECKING SOFTWARE, PROCEEDINGS, 2002, 2318 : 187 - 204
  • [29] Proving group protocols secure against eavesdroppers
    Kremer, Steve
    Mercier, Antoine
    Treinen, Ralf
    AUTOMATED REASONING, PROCEEDINGS, 2008, 5195 : 116 - +
  • [30] A LA BURSTALL INTERMITTENT ASSERTIONS INDUCTION PRINCIPLES FOR PROVING INEVITABILITY PROPERTIES OF PROGRAMS
    COUSOT, P
    COUSOT, R
    THEORETICAL COMPUTER SCIENCE, 1993, 120 (01) : 123 - 155