Strategy for verifying security protocols with unbounded message size

被引:2
|
作者
Chevalier Y. [1 ]
Vigneron L. [1 ]
机构
[1] LORIA, UHP, 54506 Vandoeuvre-les-Nancy Cedex, Campus Scientifique
关键词
Automatic strategies; Flaw detection; Intruder model; Security protocols; Verification;
D O I
10.1023/B:AUSE.0000017741.10347.9b
中图分类号
学科分类号
摘要
We present a system for automatically verifying cryptographic protocols. This system manages the knowledge of principals and checks if the protocol is runnable. In this case, it outputs a set of rewrite rules describing the protocol itself, the strategy of an intruder, and the goal to achieve. The protocol specification language permits to express commonly used descriptions of properties (authentication, short term secrecy, and so on) as well as complex data structures such as tables and hash functions. The generated rewrite rules can be used for detecting flaws with various systems: theorem proving in first-order logic, on-the-fly model-checking, or SAT-based state exploration. These three techniques are being experimented in the European Union project AVISPA. The aim of this paper is to describe the analysis process. First, we describe the major steps of the compilation process of a protocol description by our tool Casrul. Then, we describe the behavior of the intruder defined for the analysis. Our intruder is based on a lazy strategy, and is implemented as rewrite rules for the theorem prover daTac. Another advantage of our model is that it permits to handle parallel executions of the protocol and composition of keys. And for sake of completeness, it is possible, using Casrul, to either specify an unbounded number of executions or an unbounded message size. The combination of Casrul and daTac has permitted successful studying of various protocols, such as NSPK, EKE, RSA, Neumann-Stubblebine, Kao-Chow and Otway-Rees. We detail some of these examples in this paper. We are now studying the SET protocol and have already very encouraging results.
引用
收藏
页码:141 / 166
页数:25
相关论文
共 50 条
  • [21] Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
    Schaller, Patrick
    Schmidt, Benedikt
    Basin, David
    Capkun, Srdjan
    PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, 2009, : 109 - 123
  • [22] Verifying security protocols with PVS: widening the rank function approach
    Evans, N
    Schneider, S
    JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2005, 64 (02): : 253 - 284
  • [23] Unbounded Verification, Falsification, and Characterization of Security Protocols by Pattern Refinement
    Cremers, Cas J. F.
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 119 - 128
  • [24] Verifying security Protocols for sensor networks using algebraic specification techniques
    Ouranos, Iakovos
    Stefaneas, Petros
    ALGEBRAIC INFORMATICS, 2007, 4728 : 247 - +
  • [25] Verifying multicast-based security protocols using the inductive method
    Jean Everson Martina
    Lawrence Charles Paulson
    International Journal of Information Security, 2015, 14 : 187 - 204
  • [26] Verifying multicast-based security protocols using the inductive method
    Martina, Jean Everson
    Paulson, Lawrence Charles
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (02) : 187 - 204
  • [27] A Security Calculus of Concurrent Objects for Verifying Ad Hoc Network protocols
    Li, Qin
    Zeng, Qingkai
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 232 - 239
  • [28] An abstraction and refinement framework for verifying security protocols based on logic programming
    Li, MengJun
    Zhou, Ti
    Li, ZhouJun
    Chen, HuoWang
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 166 - +
  • [29] Performance of security options for message protocols: A comparative analysis
    Bezerra, Wesley dos Reis
    Koch, Fernando
    Westphall, Carlos Becker
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2024, 34 (05)
  • [30] Verification of security protocols with lists: From length one to unbounded length
    Paiola, Miriam
    Blanchet, Bruno
    JOURNAL OF COMPUTER SECURITY, 2013, 21 (06) : 781 - 816