The CL-Atse Protocol Analyser

نویسنده

  • Mathieu Turuani
چکیده

This paper presents an overview of the CL-Atse tool, an efficient and versatile automatic analyser for the security of cryptographic protocols. CL-Atse takes as input a protocol specified as a set of rewriting rules (IF format, produced by the AVISPA compiler), and uses rewriting and constraint solving techniques to model all reachable states of the participants and decide if an attack exists w.r.t. the Dolev-Yao intruder. Any state-based security property can be modelled (like secrecy, authentication, fairness, etc...), and the algebraic properties of operators like xor or exponentiation are taken into account with much less limitations than other tools, thanks to a complete modular unification algorithm. Also, useful constraints like typing, inequalities, or shared sets of knowledge (with set operations like removes, negative tests, etc...) can also be analysed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysing IBM’s Common Cryptographic Architecture API with a Protocol Analysis Tool

We present results from the application of CL-AtSe, a protocol analysis tool, to the problem of analysing the security of IBM’s Common Cryptographic Architecture (CCA) API. IBM’s CCA API is used by a number of security modules in Automated Teller Machine networks, and has been the focus of previous formal analysis attempts. We show how a key-management API can be modelled in a way that facilita...

متن کامل

Adding Integrity to the Ephemerizer’s Protocol

We present a symbolic analysis of the ephemerizer’s protocol by Radia Perlman, using the CL-Atse tool from the AVISPA’s tool-suite. This protocol allows transmitting a data that will “disappear” (i.e. cannot be retrieved) after a certain time. We show that this protocol is secured for this property plus the secrecy of the data, but is trivially non secured for it’s integrity. Therefore, we pres...

متن کامل

Comparison of Cryptographic Verification Tools Dealing with Algebraic Properties

Recently Kuesters et al proposed two new methods using ProVerif for analyzing cryptographic protocols with Exclusive-Or and Diffie-Hellman properties. Some tools, for instance CL-Atse and OFMC, are able to deal with Exclusive-Or and Diffie-Hellman. In this article we compare time efficiency of these tools verifying some protocols of the litterature that are designed with such algebraic properties.

متن کامل

Akebia trifoliate (Thunb.) Koidz Seed Extract Inhibits the Proliferation of Human Hepatocellular Carcinoma Cell Lines via Inducing Endoplasmic Reticulum Stress

Akebia Fructus has long been used for hepatocellular carcinoma (HCC) in China, while the molecular mechanism remains obscure. Our recent work found that Akebia trifoliate (Thunb.) Koidz seed extract (ATSE) suppressed proliferation and induced endoplasmic reticulum (ER) stress in SMMC-7721. The present study aimed to throw more light on the mechanism. ER stress occurred after ATSE treatment in H...

متن کامل

Automated verification of a key management architecture for hierarchical group protocols

Emerging applications require secure group communications around hierarchical architecture protocols, like military or public emergency applications. However, conceiving such secure hierarchical protocols is not straightforward. Thus, their verification become a primordial issue in order to avoid the possible security attacks and vulnerabilities. Several attempts have been done to deal with for...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006