Toward Compositional Analysis of Security Protocols Using Theorem Proving
نویسندگان
چکیده
Complex security protocols require a formal approach to ensure their correctness. The protocols are frequently composed of several smaller, simpler components. We would like to take advantage of the compositional nature of such protocols to split the large veri cation task into separate and more manageable pieces. Various formalisms have been used successfully for reasoning about large protocol compositions by hand. However, hand proofs are prone to error. Automated proof systems can help make the proofs more rigorous. The goal of our work is to develop an automated proof environment for compositional reasoning about systems. This environment would combine the power of compositional reasoning with the rigor of mechanically-checked proofs. The hope is that the resulting system would be useful in veri cation of security protocols of real-life size and complexity. Toward this goal, we present results of a case study in compositional veri cation of a private communication protocol with the aid of automated proof tool Isabelle/IOA. This research is sponsored in part by the the National Science Foundation under Grant No. CCR-9523972 and the National Security Agency under Award Number MDA904-99-C-5020. The U.S. Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright annotation thereon. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the o cial policies or endorsements, either expressed or implied of the U.S. Government.
منابع مشابه
A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملMining Inconsistent Secure Messages Toward Analyzing Security Protocols
Traditional approaches such as theorem proving and model checking have been successfully used to analyze security protocols. Ideally, they assume the data communication is reliable and require the user to predetermine authentication goals. However, missing and inconsistent data have been greatly ignored, and the increasingly complicated security protocol makes it difficult to predefine such goa...
متن کاملFormal Methods Research at SICS and KTH: An Overview
The Formal Design Techniques (FDT) Lab at SICS 3 with associated members at the Laboratory of Electronics and Computer Systems (LECS) at the Department of Microelectronics and Information Technology, KTH 4 performs research on theories, tools, and applications of formal methods with particular emphasis on security aspects of distributed systems. The overall focus is on automated and semiautomat...
متن کاملA Compositional Logic for Proving Security Properties of Protocols
We present a logic for proving security properties of protocols that usenonces (randomly generated numbers that uniquely identify a protocol ses-sion) and public-key cryptography. The logic, designed around a processcalculus with actions for each possible protocol step, consists of axiomsabout protocol actions and inference rules that yield assertions about proto-cols compos...
متن کاملOh!... is it really you? : using rank functions to verify authentication protocols
A security protocol is a mechanism designed to allow secure communications through an insecure medium, even when that medium is controlled by a hostile attacker. Historically, approaches to analysis of security protocols have fallen into two broad categories: model checking and theorem proving. Each has its strengths, but the weaknesses of each are all too apparent. Model checking suffers from ...
متن کامل