Complementing Computational Protocol Analysis with Formal Specifications
نویسندگان
چکیده
The computational proof model of Bellare and Rogaway for cryptographic protocol analysis is complemented by providing a formal specification of the actions of the adversary and the protocol entities. This allows a matching model to be used in both a machine-generated analysis and a human-generated computational proof. Using a protocol of Jakobsson and Pointcheval as a case study, it is demonstrated that flaws in the protocol could have been found with this approach, providing evidence that the combination of human and computer analysis can be more effective than either alone. As well as finding the known flaw, previously unknown flaws in the protocol are discovered by the automatic analysis.
منابع مشابه
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملSemi-Automatic Implementation of Transport and Session Protocols
The paper describes experience with the use of formal protocol specifications in the protocol implementation process. As formal description techniques (FDT) for OSI protocols are being standardized, formal OSI protocol specifications in these FDT's become available on a trial basis. The technical issues involved in the use of such specifications for the automation of the implementation process ...
متن کاملFormal Methods for Describing Distributed Systems: a Discussion of the Experience in Osi Standardization*
Distributed systems are difficult to design and implement because of concurrent activities in the different system components. The use of formal specifications for describing the behavior of these components facilitates the systematic analysis of the system and its implementation. So-called formal description techniques (FDT's) have been developed in recent years for the formal description of t...
متن کاملUsing Process Algebra to Design Better Protocols
Protocols are mainly specified in natural languages, such as English, without presenting a formal specification or some sort of pseudo code. At first glance this seems to be an advantage: everybody can easily read and understand the specification, and hence, the protocol is easy to implement. However, looking at contemporary protocol developments more closely, it turns out that natural language...
متن کاملModular specification and verification of XTP
The transfer protocol framework supports the formal specification and verification of data transfer protocols. It consists of generic specification modules and theorems. Compositions of specification module instances result in well-structured specifications which describe a protocol, the medium used, and the service provided by means of TLA formulas. The protocol verification is based on the pr...
متن کامل