A METHODOLOGY FOR MECHANICALLY VERIFYING PROTOCOLS USING AN AUTHENTICATION LOGIC Munna
نویسنده
چکیده
This paper describes a methodology that can be used for rigorously developing authentication protocols for distributed systems. It is based on the logic of authentication proposed by Lampson et al. We implemented the logic of authentication using Higher Order Logic (HOL) as the theorem prover. Based on this implementation, a methodology was developed for analyzing authentication protocols for distributed systems, and was utilized to analyze published authentication protocols. This methodology took into consideration the prudent engineering practices for cryptographic protocol design, proposed by Abadi and Needham. It was observed that formalizing the steps in a protocol let the aws in the design be easily noticeable. The methodology developed assists in systematically checking for known types of vulnerabilities in authentication protocols.
منابع مشابه
Distributed System Security via Logical Frameworks
We describe a project to advance security in distributed systems via the application of logical frameworks. At the heart of the effort lies an authorization logic which plays a triple role: (1) to specify an access-control policy as a logical theory, (2) to enforce the policy by mechanically verifying proofs in the logic, and (3) to reason about the policy by characterizing the space of all pos...
متن کاملVerifying Cryptographic Protocols for Electronic Commerce
This paper describes the Convince toolset for detecting common errors in cryptographic protocols, protocols of the sort used in electronic commerce. We describe using Convince to analyze confidentiality, authentication, and key distribution in a recently developed protocol proposed for incorporation into a network bill-payment system, a public-key version of the Kerberos authentication protocol...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملFormalising theories of trust for authentication protocols
This paper discusses a formal approach for establishing theories of trust for authentication systems which can be used to reason about how agent beliefs evolve through time. The goal of an authentication system is to verify and authorise users in order to protect restricted data and information, so trust is a critical issue for authentication systems. After authentication, two principals (peopl...
متن کاملVerifying authentication protocols: methodology and example
We present a new approach to the analysis of authenti-cation protocols. The approach consists of several elements: a speciication language for formally specifying authentication protocols, a semantic model for characterizing protocol executions, an assertion language for stating secrecy and correspondence properties, and procedures for verifying these properties. The main emphasis of this paper...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1997