Logic of Events for Proving Security Properties of Protocols

被引:11
|
作者
Xiao, Meihua [1 ]
Bickford, Mark [2 ]
机构
[1] Nanchang Univ, Sch Informat, Nanchang 330031, Peoples R China
[2] Cornell Univ, Dept Comp Sci, Ithaca, NY 14850 USA
关键词
Cryptographic Protocols; Formal Analysis; Logic of Events;
D O I
10.1109/WISM.2009.111
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Formal methods are vital for ensuring the security and reliability of the network systems. We propose a promising method to check security properties of cryptographic protocols using logic of events theory. The logic is designed around a message automaton with actions for possible protocol steps including generating new nonces, sending and receiving messages, and performing encryption, decryption and digital signature verification actions. We figure out types for the keys, nonces, and messages of the protocol and present novel proof rules and mechanism for protocol actions, temporal reasoning, and a specialized form of invariance rule. It puts no bound on the size of the principal and requires no state space enumeration. Our main theorem guarantees that any well-typed protocol is robustly safe under attack while reasoning only about the actions of honest principals in the protocol.
引用
收藏
页码:519 / +
页数:2
相关论文
共 50 条
  • [31] Proving Mutual Authentication Property of RCIA Protocol in RFID Based on Logic of Events
    Zhong Xiaomei
    Xiao Meihua
    Zhang Tong
    Yang Ke
    Luo Yunxian
    CHINESE JOURNAL OF ELECTRONICS, 2022, 31 (01) : 79 - 88
  • [32] Proving Authentication Property of Modified Needham-Schroeder Protocol with Logic of Events
    Xiao, M. H.
    Deng, C. Y.
    Ma, C. L.
    Zhu, K.
    Cheng, D. L.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL APPLICATIONS (CISIA 2015), 2015, 18 : 379 - 383
  • [33] Proving Mutual Authentication Property of RCIA Protocol in RFID Based on Logic of Events
    ZHONG Xiaomei
    XIAO Meihua
    ZHANG Tong
    YANG Ke
    LUO Yunxian
    Chinese Journal of Electronics, 2022, 31 (01) : 79 - 88
  • [34] On proving in epistemic logic
    Grzegorczyk, Dawid
    Mulawka, Jan J.
    Nieznanski, Edward
    PHOTONICS APPLICATIONS IN ASTRONOMY, COMMUNICATIONS, INDUSTRY, AND HIGH-ENERGY PHYSICS EXPERIMENTS 2012, 2012, 8454
  • [35] Proving completeness by logic
    Escoffier, B
    Paschos, VT
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2005, 82 (02) : 151 - 161
  • [36] Planning attacks to security protocols: Case studies in logic programming
    Aiello, LC
    Massacci, F
    COMPUTATIONAL LOGIC: LOGIC PROGRAMMING AND BEYOND, PT I: ESSAYS IN HONOUR OF ROBERT A KOWALSKI, 2002, 2407 : 533 - 560
  • [37] Security protocols verification in abductive logic programming: A case study
    Alberti, Marco
    Chesani, Federico
    Gavanelli, Marco
    Lamma, Evelina
    Mello, Paola
    Torroni, Paolo
    ENGINEERING SOCIETIES IN THE AGENTS WORLD VI, 2006, 3963 : 106 - 124
  • [38] A Spatial-Epistemic Logic for Reasoning about Security Protocols
    Toninho, Bernardo
    Caires, Luis
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2011, (51): : 1 - 15
  • [39] Proof theory, transformations, and logic programming for debugging security protocols
    Delzanno, G
    Etalle, S
    LOGIC BASED PROGRAM SYNTHESIS AND TRANSFORMATION, 2002, 2372 : 76 - 90
  • [40] Security protocols: from linear to classical logic by abstract interpretation
    Blanchet, B
    INFORMATION PROCESSING LETTERS, 2005, 95 (05) : 473 - 479