Framework for reasoning about cryptographic protocols with randomization
نویسنده
چکیده
Context. Cryptographic protocols are distributed programs which use cryptographic primitives to secure communication over untrusted networks (such as the Internet). They are designed to achieve security properties such as confidentiality, authentication or anonymity. Due to the complexity of cryptographic primitives, the inherent concurrency and the untrusted nature of networks, their design has often proved to be error-prone. In order to tackle this problem, formal methods have been designed to detect errors in cryptographic protocols and proved very successful. One successful approach is to model the cryptographic protocols in process calculi, and prove that the protocols behave like ideal protocols. Process calculi are ‘programing languages’ for distributed programs; and have a nondeterministic construct to model concurrency. For cryptographic protocols, applied pi-calculus [AF01] has been designed to take into account cryptographic operations. The cryptographic primitives in this framework are modeled as equational theories. While applied pi-calculus has been very successful, it cannot reason about cryptographic protocols (such as anonymity protocols and oblivious transfers) that explicitly use randomization techniques to achieve its goal. In order to achieve this, probabilistic applied pi-calculus has been proposed [GLPT07] where a probabilistic operator has been added to handle randomization. In order to give a semantics of the probabilistic applied pi-calculus, nondeterministic choices have to be resolved in presence of probabilistic choices. Usually, nondeterministic choices in probabilistic systems is resolved in the presence of schedulers. However, for security, the schedulers have to be restricted [GD07, CP10]. However, the framework in [GLPT07] suffers in that this restriction is no placed on the scheduler.
منابع مشابه
Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
The Probabilistic I/O Automata framework of Lynch, Segala and Vaandrager provides tools for precisely specifying protocols and reasoning about their correctness using multiple levels of abstraction, based on implementation relationships between these levels. We enhance this framework to allow analyzing protocols that use cryptographic primitives. This requires resolving and reconciling issues s...
متن کاملUsing Task-Structured Probabilistic I/O Automata to Analyze Cryptographic Protocols
The Probabilistic I/O Automata (PIOA) framework of Lynch, Segala and Vaandrager provides tools for precisely specifying protocols and reasoning about their correctness based on implementation relationships between multiple levels of abstraction. We enhance this framework to allow the analysis of protocols that use cryptographic primitives. For this purpose, we propose new techniques for handlin...
متن کاملAutomatic Verification of Cryptographic Protocols in First-Order Logic
In this paper, a new first-order logical framework and method of formalizing and verifying cryptographic protocols is presented. From the point of view of an intruder, the protocol and abilities of the intruder are modeled in Horn clauses. Based on deductive reasoning method, secrecy of cryptographic protocols is verified automatically, and if the secrecy is violated, attack scenarios can be pr...
متن کاملModeling Complexity in Secure Distributed Computing
Security considerations play an increasingly important role for distributed computing. In the future, dependable distributed systems for open networks can no longer be designed without taking malicious attacks into account. The enabling technology for security is cryptography, which has been placed on sound theoretical foundations during the last twenty years. The formal model of modern cryptog...
متن کاملA Logic for Automatic Verification of Cryptographic Protocols
this paper, a new first-order logical framework and method of formalizing and verifying cryptographic protocols is presented. From the point of view of an intruder, the protocol and abilities of the intruder are modeled in Horn clauses. Based on deductive reasoning method, secrecy of cryptographic protocols is verified automatically, and if the secrecy is violated, attack scenarios can be prese...
متن کامل