Automatic verification of correspondences for security protocols
نویسنده
چکیده
We present a new technique for verifying correspondences in security proto-cols. In particular, correspondences can be used to formalize authentication. Ourtechnique is fully automatic, it can handle an unbounded number of sessions of theprotocol, and it is efficient in practice. It significantly extends a previous techniquefor the verification of secrecy. The protocol is represented in an extension of thepi calculus with fairly arbitrary cryptographic primitives. This protocol represen-tation includes the specification of the correspondence to be verified, but no otherannotation. This representation is then translated into an abstract representation byHorn clauses, which is used to prove the desired correspondence. Our techniquehas been proved correct and implemented. We have tested it on various proto-cols from the literature. The experimental results show that these protocols can beverified by our technique in less than 1 s.
منابع مشابه
A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملAnBx: Automatic Generation and Verification of Security Protocols Implementations
The AnBx compiler is a tool for automatic generation of Java implementations of security protocols specified in a simple and abstract model that can be formally verified. In our model-driven development approach, protocols are described in AnBx , an extension of the Alice & Bob notation. Along with the synthesis of consistency checks, the tool analyses the security goals and produces annotation...
متن کاملOn formal and automatic security verification of WSN transport protocols
In this paper, we address the problem of formal and automated security verification ofWSN transport protocols that may perform cryptographic operations. The verification ofthis class of protocols is difficult because they typically consist of complex behavioral charac-teristics, such as real-time, probabilistic, and cryptographic operations. To solve this problem,we propose a pr...
متن کاملA framework for compositional verification of security protocols
Automatic security protocol analysis is currently feasible only for small protocols. Since larger protocols quite often are composed of many small protocols, compositional analysis is an attractive, but non-trivial approach. We have developed a framework for compositional analysis of a large class of security protocols. The framework is intended to facilitate automatic as well as manual verific...
متن کاملFast and Automatic Verification of Authentication and Key Exchange Protocols 1
1 Preliminary versions of this paper appeared in [1, 2]. Summary It is preferable for authentication and key exchange protocols to be verified automatically and rapidly in accordance with security requirements. In order to meet these requirements, we proposed the security verification method (OKT method) for the aforementioned protocols based on Bellare et al.'s model (BPR model) and showed the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Journal of Computer Security
دوره 17 شماره
صفحات -
تاریخ انتشار 2009