The Inductive Approach to Verifying Cryptographic Protocols

نویسندگان

چکیده

Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is based on ordinary predicate calculus and copes with infinite-state systems. Proofs generated Isabelle/HOL. human effort required to analyze a protocol as little week or two, yielding proof script takes few minutes run. Protocols inductively defined sets of traces. A trace list communication events, perhaps comprising many interleaved runs. Protocol descriptions incorporate attacks accidental losses. model spy knows some private keys forge messages components decrypted from previous traffic. Three analyzed below: Otway-Rees (which uses shared-key encryption), Needham-Schroeder public-key recursive by Bull Otway variable length). One prove event $ev$ always precedes $ev'$ property $P$ holds provided $X$ remains secret. Properties proved the viewpoint various principals: say, if $A$ receives final message $B$ then session key it conveys good.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Inductive Approach to Verifying Cryptographic Protocols

Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is based on ordinary predicate calculus and copes with infinite-state systems. Proofs are generated using Isabelle/HOL. The human effort required to analyze a protocol can be as little as a week or two, yielding a proof script that takes a few minutes to run. Protocols are i...

متن کامل

The Coinductive Approach to Verifying Cryptographic Protocols

We look at a new way of specifying and verifying cryptographic protocols using the Coalgebraic Class Specification Language. Protocols are specified into CCSL (with temporal operators for “free”) and translated by the CCSL compiler into theories for the theorem prover PVS. Within PVS, the desired security conditions can then be (dis)proved. In addition, we are interested in using assumptions wh...

متن کامل

Inductive Verification of Cryptographic Protocols

The dissertation aims at tailoring Paulson’s Inductive Approach for the analysis of classical cryptographic protocols towards real-world protocols. The aim is pursued by extending the approach with new elements (e.g. timestamps and smart cards), new network events (e.g. message reception) and more expressive functions (e.g. agents’ knowledge). Hence, the aim is achieved by analysing large proto...

متن کامل

Computing Symbolic Models for Verifying Cryptographic Protocols

We consider the problem of automatically verifying infinite-state cryptographic protocols. Specifically, we present an algorithm that given a finite process describing a protocol in a hostile environment (trying to force the system into a “bad” state) computes a model of traces on which security properties can be checked. Because of unbounded inputs from the environment, even finite processes h...

متن کامل

Verifying Cryptographic Protocols for Electronic Commerce

This paper describes the Convince toolset for detecting common errors in cryptographic protocols, protocols of the sort used in electronic commerce. We describe using Convince to analyze confidentiality, authentication, and key distribution in a recently developed protocol proposed for incorporation into a network bill-payment system, a public-key version of the Kerberos authentication protocol...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computer Security

سال: 2021

ISSN: ['0926-227X', '1875-8924']

DOI: https://doi.org/10.3233/jcs-1998-61-205