A Logic for Automatic Verification of Cryptographic Protocols
نویسندگان
چکیده
this paper, a new first-order logical framework and method of formalizing and verifying cryptographic protocols is presented. From the point of view of an intruder, the protocol and abilities of the intruder are modeled in Horn clauses. Based on deductive reasoning method, secrecy of cryptographic protocols is verified automatically, and if the secrecy is violated, attack scenarios can be presented through back-tracing. The method has been implemented in an automatic verifier, many examples of protocols have been analyzed in less then 1s. I. INTRODUCTION A cryptographic protocol is a precisely defined sequence of communication and computation steps using cryptographic mechanism, its aim is ensuring the security of the transaction and communication in network or distributed systems. The rapid extending of the internet causes a growing need for cryptographic protocols, but it is well known that the design of such protocols is difficult and error-prone. Therefore, it is necessary to study formal analysis methods and automatic verification tools for the cryptographic protocols. Researchers have adopted many theories and techniques to build automatic verification tools. The theories are mainly derived from based on model checking suffer from the problem of the state space explosion, while verifiers based on theorem proving usually need manual intervention. In this paper, we present a new formal approach for automatic verification of cryptographic protocols. This approach is fully automatic and terminable. The main contributions of the paper are: a general framework of formalizing cryptographic protocol and abilities of the intruder, a practical solving algorithm based on automatic reasoning, and a simple method to find the attack scenarios.
منابع مشابه
A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملAutomatic Verification of Cryptographic Protocols in First-Order Logic
In this paper, a new first-order logical framework and method of formalizing and verifying cryptographic protocols is presented. From the point of view of an intruder, the protocol and abilities of the intruder are modeled in Horn clauses. Based on deductive reasoning method, secrecy of cryptographic protocols is verified automatically, and if the secrecy is violated, attack scenarios can be pr...
متن کاملAutomatic verification of temporal-epistemic properties of cryptographic protocols
We present a technique for automatically verifying cryptographic protocols specified in the mainstream specification language CAPSL. We define a translation from CAPSL models into interpreted systems, a popular semantics for temporal-epistemic logic, and rewrite CAPSL goals as temporal-epistemic specifications. We present a compiler that implements this translation. The compiler links to the sy...
متن کاملAlgebraic Abstractions
In this paper we study abstraction techniques for verification problems of the form C j= , where C is a first-order structure and is a first-order formula (both w.r.t. a given signature ). This study is motivated by the need of such abstractions for the automatic verification of properties of cryptographic protocols, which in our approach are modeled by first-order structures. Our so-called alg...
متن کاملTool-supported Veriication of Cryptographic Protocols
The correct and awless design of cryptographic protocols is crucial for the security of network services. As security aws within such protocols are in general very hard to detect, their security properties must be formally veriied. A computer-supported prove is highly desirable, but formal techniques as well as automatic theorem provers are hard to use for a non-specialist. To ooer a user-frien...
متن کامل