Towards the verification of security protocols that use temporary secrets
نویسندگان
چکیده
The rank functions approach to protocol analysis is incomplete with respect to secrecy specifications. In particular, security protocols that use temporary secrets may be un-verifiable within the framework. This paper investigates the incompleteness and proposes a solution based on a novel theory of combined rank functions. We define a procedure by which a protocol that contains a single temporary secret may be divided (under some reasonable assumptions) into two sub-protocols such that the temporary secret is a secret in the first sub-protocol and a public value in the second sub-protocol. We prove a result that allows us to conclude the correctness of the entire protocol from the correctness of each of its sub-protocols. The utility of the approach is illustrated by the use of a combination of two rank functions to verify a protocol that has no proof in the standard rank functions approach.
منابع مشابه
On the detection of desynchronisation attacks against security protocols that use dynamic shared secrets
Many peer-to-peer security protocols in mobile communications utilise shared secrets. Synchronous storage of shared secrets is imperative for the successful operation of security protocols, as asynchronous storage of shared secrets may lead to service unavailability. Hence, update mechanisms must not only guarantee the secrecy of shared secrets, but also their synchrony. This paper addresses sy...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملProcess algebraic modeling of authentication protocols for analysis of parallel multi-session executions
Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...
متن کاملA Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing
Correctness verification of query results is a significant challenge in database outsourcing. Most of the proposed approaches impose high overhead, which makes them impractical in real scenarios. Probabilistic approaches are proposed in order to reduce the computation overhead pertaining to the verification process. In this paper, we use the notion of trust as the basis of our probabilistic app...
متن کاملTimed Automata Based Model Checking of Timed Security Protocols
A new approach to verification of timed security protocols is given. The idea consists in modelling a finite number of users (including an intruder) of the computer network and their knowledge about secrets by timed automata. The runs of the product automaton of the above automata correspond to all the behaviours of the protocol for a fixed number of sessions. Verification is performed using th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007