automatic verification of authentication protocols using genetic programming

thesis
abstract

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the system. many methods have been used to verify the cryptographic protocols such as logical, algebraic, inductive, and mathematical complexity methods. each of these methods has its special shortages, in addition to the general disadvantages of these methods. nevertheless, no one has tried to use the computational methods as cryptographic protocol’s verifiers. in this thesis, we represent genetic programming – a type of computational methods- as a new verification method for the cryptographic protocols. gaprover; new genetic programming based system has been built and successfully used to verify some known authentication protocols. we wish a new horizon would be opened in the field of cryptographic protocol verification because of this effort. moreover, we believe that further development of this method may solve many problems that encountered by researchers in the field of protocol verification because of the use of formal methods.

First 15 pages

Signup for downloading 15 first pages

Already have an account?login

similar resources

Verification of Authentication Protocols using SDL-method

Authentication between protocol agents is widely studied in the cryptographic protocol analysis area. It is essential in a virtual environment to rely on protocol parties' identity. In the academic literature there are many protocols that provide the authentication property. We present in this paper a new mechanism to verify authentication using SDL, general purpose specification language. We h...

full text

Experiments on the Automatic Evolution of Protocols Using Genetic Programming

One of the biggest challenges in obtaining truly autonomic, selfmanaged networks is to automate the process of software evolution, and in particular, the evolution of protocol implementations and configurations. Such networks ultimately require self-modifying, evolving protocol software. Otherwise humans must intervene in every situation that has not been anticipated at design time. For this to...

full text

Towards Automatic Verification of Authentication Protocols on an Unbounded Network

Schneider’s work on rank functions [14] provides a formal approach to verification of certain properties of a security protocol. However, he illustrates the approach only with a protocol running on a small network; and no help is given with the somewhat hit-and-miss process of finding the rank function which underpins the central theorem. In this paper, we develop the theory to allow for an arb...

full text

Automatic Programming of Robots Using Genetic Programming

The goal in automatic programming is to get a computer to perform a task by telling it what needs to be done, rather than by explicitly programming it. This paper considers the task of automatically generating a computer program to enable an autonomous mobile robot to perform the task of moving a box from the middle of an irregular shaped room to the wall. We compare the ability of the recently...

full text

Dimensionality Reduction and Improving the Performance of Automatic Modulation Classification using Genetic Programming (RESEARCH NOTE)

This paper shows how we can make advantage of using genetic programming in selection of suitable features for automatic modulation recognition. Automatic modulation recognition is one of the essential components of modern receivers. In this regard, selection of suitable features may significantly affect the performance of the process. Simulations were conducted with 5db and 10db SNRs. Test and ...

full text

Formal Verification of IEEE 802.11 Authentication Protocols

IEEE 802.11 is the standard designed to provide secured communication in wireless LAN. The IEEE 802.11i specification contains both WPA-PSK, WPA-GPG authentication protocols. IEEE 802.11w authentication protocol enhances the IEEE802.11i security for selected management frames. These protocols allow a wireless station to gain access to a protected wireless network managed by an access point. In ...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


document type: thesis

وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023