A Logic for Automatic Verification of Cryptographic Protocols

نویسندگان

  • Jihong Han
  • Zhiyong Zhou
  • Yadi Wang
چکیده

this paper, a new first-order logical framework and method of formalizing and verifying cryptographic protocols is presented. From the point of view of an intruder, the protocol and abilities of the intruder are modeled in Horn clauses. Based on deductive reasoning method, secrecy of cryptographic protocols is verified automatically, and if the secrecy is violated, attack scenarios can be presented through back-tracing. The method has been implemented in an automatic verifier, many examples of protocols have been analyzed in less then 1s. I. INTRODUCTION A cryptographic protocol is a precisely defined sequence of communication and computation steps using cryptographic mechanism, its aim is ensuring the security of the transaction and communication in network or distributed systems. The rapid extending of the internet causes a growing need for cryptographic protocols, but it is well known that the design of such protocols is difficult and error-prone. Therefore, it is necessary to study formal analysis methods and automatic verification tools for the cryptographic protocols. Researchers have adopted many theories and techniques to build automatic verification tools. The theories are mainly derived from based on model checking suffer from the problem of the state space explosion, while verifiers based on theorem proving usually need manual intervention. In this paper, we present a new formal approach for automatic verification of cryptographic protocols. This approach is fully automatic and terminable. The main contributions of the paper are: a general framework of formalizing cryptographic protocol and abilities of the intruder, a practical solving algorithm based on automatic reasoning, and a simple method to find the attack scenarios.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

Automatic Verification of Cryptographic Protocols in First-Order Logic

In this paper, a new first-order logical framework and method of formalizing and verifying cryptographic protocols is presented. From the point of view of an intruder, the protocol and abilities of the intruder are modeled in Horn clauses. Based on deductive reasoning method, secrecy of cryptographic protocols is verified automatically, and if the secrecy is violated, attack scenarios can be pr...

متن کامل

Automatic verification of temporal-epistemic properties of cryptographic protocols

We present a technique for automatically verifying cryptographic protocols specified in the mainstream specification language CAPSL. We define a translation from CAPSL models into interpreted systems, a popular semantics for temporal-epistemic logic, and rewrite CAPSL goals as temporal-epistemic specifications. We present a compiler that implements this translation. The compiler links to the sy...

متن کامل

Algebraic Abstractions

In this paper we study abstraction techniques for verification problems of the form C j= , where C is a first-order structure and is a first-order formula (both w.r.t. a given signature ). This study is motivated by the need of such abstractions for the automatic verification of properties of cryptographic protocols, which in our approach are modeled by first-order structures. Our so-called alg...

متن کامل

Tool-supported Veriication of Cryptographic Protocols

The correct and awless design of cryptographic protocols is crucial for the security of network services. As security aws within such protocols are in general very hard to detect, their security properties must be formally veriied. A computer-supported prove is highly desirable, but formal techniques as well as automatic theorem provers are hard to use for a non-specialist. To ooer a user-frien...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007