Three variations on the analysis of the Needham-Schroeder Public-Key Protocol with MGS

نویسندگان

  • Olivier Michel
  • Jean-Louis Giavitto
  • Florent Jacquemard
چکیده

In this paper, we develop an analysis of the Needham-Schroeder Public-Key Protocol (NSPK) using a P system approach. This analysis is used to validate the protocol and exhibits, as expected, a well known logical attack. The novelty of our approach is to use MGS, a P system like formalism, to find the attack by a systematic state exploration. The use of multiset rewriting has already been advocated for the development of protocol validation tools. In this work, we focus on the use of nested multisets (i.e. membranes). The use of membranes enables to tight the conditions for detecting an attack. All the three proposed version of the analysis have been successfully implemented in MGS and we conclude the paper by a discussion on how the MGS programs can be translated into standard P systems. 1 Goal and Motivations Since the 1994 landmark demonstration by Adleman of the possibilities of DNA to solve a class of combinatorial problems, biocomputing has often be advocated to develop “chemically combinatorial problem solvers”. In this paper, we want to use the computational model of P system to address a well known combinatorial problem: the analysis of a cryptographic protocol. ∗Corresponding author : LaMI umr 8042 CNRS – Université d’Évry, Tour Évry-2, 523 place des terrasses de l’agora, 91000 France. Email: [email protected] †LSV, CNRS UMR 8643 – ENS de Cachan, 61 avenue du Président Wilson, 94235 CACHAN Cedex, France. Email: [email protected] ‡LaMI umr 8042 CNRS – Université d’Évry, Tour Évry-2, 523 place des terrasses de l’agora, 91000 France. Email: [email protected]

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Csp for Protocol Analysis: the Needham-schroeder Public-key Protocol

This paper presents a general approach for analysis and veriication of authentication properties in CSP. It is illustrated by an examination of the Needham-Schroeder Public-Key protocol. The paper aims to develop a speciic theory appropriate to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach aims to combine the ability to express such ...

متن کامل

Mechanized Proofs of Security Protocols: Needham-Schroeder with Public Keys

The inductive approach to verifying security protocols, previously applied to shared-key encryption [8], is here applied to the public key version of the Needham-Schroeder protocol. As before, mechanized proofs are performed using Isabelle/HOL. Both the original, awed version and Lowe's improved version are studied; the properties proved highlight the distinctions between the two versions. The ...

متن کامل

An Attack on the Needham-Schroeder Public-Key Authentication Protocol

In this paper we present an attack upon the Needham Schroeder public key authentication protocol The attack allows an intruder to impersonate another agent

متن کامل

A Theorem for Secrecy in Tagged Protocols Using the Theory of Witness-Functions

In this paper, we enunciate the theorem of secrecy in tagged protocols using the theory of witness-functions and we run a formal analysis on a new tagged version of the Needham-Schroeder public-key protocol using this theorem. We discuss the significance of tagging in securing cryptographic protocols as well.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004