On the Automation of Gny Logic

نویسنده

  • R. Safavi-Naini
چکیده

The cryptographic protocol analysis logic of Gong, Needham and Yahalom (GNY) ooers signiicant advantages over its predecessor, the Burrows, Abadi and Needham (BAN) logic. Manual analysis of protocols using the GNY logic, however, is cumbersome , as the logic has a large set of inference rules. This paper proposes a modiied GNY logic, and describes the implementation of a protocol analysis tool based on that logic. The modiications ensure that no useful inferences are lost, and allow the logical statements derivable from a given protocol to be deduced in a nite number of steps. The tool ooers a facility to automatically generate proofs of protocol goals. It has proved useful in mechanically verifying the need for several inference rules which are all absent from the original GNY logic.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Facilitating the Modelling and Automated Analysis of Cryptographic Protocols

Multi-dimensional security protocol engineering is effective for creating cryptographic protocols since it encompasses a variety of design, analysis and deployment techniques, thereby providing a higher level of confidence than individual approaches. SPEAR II, the Security Protocol Engineering and Analysis Resource II, is a protocol engineering tool built on the foundation of previous experienc...

متن کامل

Using Gypsie, Gynger and Visual GNY to Analyse Cryptographic Protocols in SPEAR II

The development of cryptographic logics to analyze security protocols has provided one technique for ensuring the correctness of these protocols. However, it is commonly acknowledged that analysis using a modal logic such as GNY tends to be inaccessible and obscure for the uninitiated. In this paper we describe the SPEAR II graphically-based security protocol engineering environment that can be...

متن کامل

An Environment to Facilitate the Teaching of GNY-Based Security Protocol Analysis Techniques

The development of cryptographic logics to analyze security protocols has provided one technique for ensuring the correctness of security protocols. However, it is commonly acknowledged that analysis using a modal logic such as GNY tends to be inaccessible and obscure for the uninitiated. In this paper we describe a graphical tree-based specification environment which operates in conjunction wi...

متن کامل

A HOL Extension of GNY for Automatically

This paper describes a Higher Order Logic (HOL) theory formalizing an extended version of the Gong, Needham, Yahalom (GNY) belief logic, a theory used by software that automatically proves authentication properties of cryptographic protocols. The theory's extensions to the GNY logic include being able to specify protocol properties at intermediate stages and being able to specify protocols that...

متن کامل

A graphical environment for the facilitation of logic-based security protocol analysis

The development of cryptographic logics to analyze security protocols has provided one technique for ensuring the correctness of security protocols. However, it is commonly acknowledged that analysis using a modal logic such as GNY tends to be inaccessible and obscure for the uninitiated. In this paper we describe a graphical tree-based specification environment which can be used to easily cons...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1995