Analysing the Woo-Lam Protocol Using CSP and Rank Functions

نویسندگان

  • Siraj Ahmed Shaikh
  • Vicky J. Bush
چکیده

Designing security protocols is a challenging and deceptive exercise. Even small protocols providing straightforward security goals, such as authentication, have been hard to design correctly, leading to the presence of many subtle attacks. Over the years various formal approaches have emerged to analyse security protocols making use of different formalisms. Schneider has developed a formal approach to modelling security protocols using the process algebra CSP (Communicating Sequential Processes). He introduces the notion of rank functions to analyse the protocols. We demonstrate an application of this approach to the Woo-Lam protocol. We describe the protocol in detail along with an established attack on its goals. We then describe Schneider’s rank function theorem and use it to analyse the protocol. ACM Classification: C.2.2 (Communication/Networking and Information Technology – Network Protocols – Protocol Verification), D.2.4 (Software Engineering – Software/Program Verification – Formal Methods), D.4.6 (Operating Systems – Security and Privacy Protection – Authentication)

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysing Time Dependent Security Properties in CSP Using PVS

This paper details an approach to verifying time dependent authen tication properties of security protocols We discuss the introduction of time into the Communicating Sequential Processes CSP protocol veri cation framework of The embedding of CSP in the theorem prover PVS Prototype Veri cation System is extended to incorporate event based time retaining the use of the existing rank function app...

متن کامل

Equal To The Task?

Many methods of analysing security protocols have been proposed, but most such methods rely on analysing a protocol running only a finite network. Some, however—notably, data independence, the strand spaces model, and the rank functions model—can be used to prove correctness of a protocol running on an unbounded network. Roscoe and Broadfoot in [17] show how data independence techniques may be ...

متن کامل

Security Analysis using Rank Functions in CSP

Communicating Sequential Processes (CSP) is an abstract language for describing processes and reasoning about their interactions within concurrent systems. It is appropriate for investigating the overall behaviour that emerges. It has a mature theory, and powerful tool support [For03] and can be considered as an off-the-shelf framework which can be customised for particular domains through addi...

متن کامل

Security Analysis using Rank Functions in CSP

Communicating Sequential Processes (CSP) is an abstract language for describing processes and reasoning about their interactions within concurrent systems. It is appropriate for investigating the overall behaviour that emerges. It has a mature theory, and powerful tool support [For03] and can be considered as an off-the-shelf framework which can be customised for particular domains through addi...

متن کامل

A formal model of Diffie-Hellman using CSP and rank functions

Formal analysis techniques have proved successful in finding flaws in security protocols. Such techniques typically assume the presence of perfect encryption, an assumption that is clearly not true in practice. When we aim to prove the correctness of a protocol, we must be more careful in assuming bounds on the capabilities of the intruder: a real intruder can, and will, exploit properties of t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Journal of Research and Practice in Information Technology

دوره 38  شماره 

صفحات  -

تاریخ انتشار 2005