A Formal Verification Centred Development Process for Security Protocols
نویسندگان
چکیده
This chapter concerns the correct and reliable design of modern security protocols. It discusses the importance of formal verification of security protocols prior to their release by publication or implementation. A discussion on logic-based verification of security protocols and its automation provides the reader with an overview of the current state-of-the-art of formal verification of security protocols. The authors propose a formal verification centred development process for security protocols. This process provides strong confidence in the correctness and reliability of the designed protocols. Thus, the usage of weak security protocols in communication systems is prevented. A case-study on the development of a security protocol demonstrates the advantages of the proposed approach. The case-study concludes with remarks on the performance of automated logic-based verification and presents an overview of formal verification results of a range of modern security protocols.
منابع مشابه
A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملSecurity protocols from the software verification perspective
We believe that it is important to verify not just the correctness of abstract security protocols, but also to verify the correctness of real implementations of security protocols. Considerable research is needed to facilitate the development process for such implementations both in terms of mathematical formalisms to describe protocols, and tools that carry out their verification. For starters...
متن کاملProcess Calculi and the Verification of Security Protocols
Recently there has been much interest towards using formal methods in the analysis of security protocols. Some recent approaches take advantage of concepts and techniques from the field of process calculi. Process calculi can be given a formal yet simple semantics, which permits rigorous definitions of such concepts as ‘attacker’, ‘secrecy’ and ‘authentication’. This feature has led to the deve...
متن کاملFormal verification : an imperative step in the design of security protocols q
Traditionally, security protocols have been designed and verified using informal techniques. However, the absence of formal verification can lead to security errors remaining undetected. Formal verification techniques, on the other hand, provide a systematic way of discovering protocol flaws. This paper discusses the process of formal verification using modal logics. The verification process is...
متن کاملAnalysis of a mobile communication security protocol
Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle design flaws. Formal verification techniques provide rigid and thorough means to evaluate security protocols. This paper demonstrates the process of formal verification by applying a logic to a security protocol intended ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007