A Reduction for Automated Veri cation of AuthenticationProtocolsScott
نویسنده
چکیده
Authentication protocols (including protocols that provide key establishment) are designed to work correctly in the presence of an adversary that can (1) perform an unbounded number of encryptions and tuplings while fabricating messages, and (2) prompt honest principals to engage in an unbounded number of concurrent runs of the protocol. The amount of local state maintained by a single run of an authentication protocol is bounded. Intuitively, this suggests that there is a bound on the resources needed to attack the protocol. Such bounds clarify the nature of attacks on and provide a rigorous basis for automated veriication of authentication protocols. However, few such bounds are known. This paper deenes a domain-speciic language for authentication protocols and establishes an upper bound on the resources needed to attack a large subset of the protocols expressible in that language, including versions of the Yahalom protocol and the Needham-Schroeder public-key protocol.
منابع مشابه
Formal Verification of Real time Software
The veri cation of functionality of the input output logic properties often composes the majority of software requirements analysis Automated theorem provers ATPs such as SRI s Prototype Veri cation System PVS have been successfully used in the formal veri cation of functional properties However such functional methods are not readily applicable to the veri cation of the real time software re q...
متن کاملFormal Veri cation of Standards for Distance Vector Routing Protocols
We show how to use an interactive theorem prover, HOL, together with a model checker, SPIN, to prove key properties of distance vector routing protocols. We do three case studies: correctness of the RIP standard, a sharp real-time bound on RIP stability, and preservation of loop-freedom in AODV, a distance vector protocol for wireless networks. We develop veri cation techniques suited to routin...
متن کاملImporting the Results of Automatic Hardware Veri cation into HOL
Formal hardware veri cation systems can be split into two categories: theorem proving systems and automatic nite state machine based systems. Each approach has its own complementary advantages and disadvantages. In this paper, we consider the combination of two such systems: HOL (a theorem proving system) and MDG (an automatic system). As HOL hardware veri cation proofs are based on the hierarc...
متن کاملLearning Minimal Separating DFA's for Compositional Veri cation
Algorithms for learning a minimal separating DFA of two disjoint regular languages have been proposed and adapted for di erent applications. One of the most important applications is learning minimal contextual assumptions in automated compositional veri cation. We propose in this paper an e cient learning algorithm, called L , that learns and generates a minimal separating DFA. Our algorithm h...
متن کاملAn Approach to Link HOL and MDG for Hardware Veri cation
In order to overcome the limitations of automated tools and the cumbersome proof process of interactive theorem proving, we adopt an hybrid approach for formal hardware veri cation by linking HOL and MDG. This approach uses the strengths of theorem proving (HOL) with its powerful mathematical tools such as induction and abstraction, and the advantages of automated tools (MDG) which support equi...
متن کامل