Formal Testing & Algebraic Modelling Techniques for Verifying Cryptographic Protocols
نویسندگان
چکیده
Before trusting a communications security protocol with potentially critical or sensitive information, it is necessary to have some degree of assurance that the protocol fulfils its intended objectives. To provide this assurance it is necessary to use formal verification techniques, as intuitive reasoning does not satisfactorily guarantee complete freedom from protocol errors. In this paper, a number of recently published formal techniques for verifying cryptographic protocols, are described. The techniques are categorised as being based on algebraic modelling, or based on some form of testing. A comparative overview of the verification techniques available is presented, indicating their benefits, limitations and scope of application.
منابع مشابه
Manual for Slede Annotation Language
Verifying sensor network security protocol implementations using testing/simulation might leave some flaws undetected. Formal verification techniques have been very successful in detecting faults in security protocol specifications; however, they generally require building a formal description (model) of the protocol. Building accurate models is hard, thus hindering the application of formal ve...
متن کاملVerifying Authentication Protocol Implementations
Formal methods for verifying authentication protocols tend to assume an idealised perfect form of encryption This approach has been spec tacularly successful in nding aws but when we aim for proofs of cor rectness then we need to consider this assumption more carefully and perhaps to weaken it to re ect properties of real cryptographic mech anisms This paper reviews the existing CSP approach to...
متن کاملA Comparative Analysis of State-Space Tools for Security Protocol Verification
State-space techniques have been proved successful as a means for finding attacks on security protocols. As well as reproducing known flaws, state-space techniques has also been used to discover new flaws in protocols In this paper, a brief overview of current state-space techniques is given and a selection of state-space tools for verifying cryptographic protocols are described, indicating the...
متن کاملVerifying Properties of Electronic Voting Protocols
In this paper we report on some recent work to formally specify and verify electronic voting protocols. In particular, we use the formalism of the applied pi calculus: the applied pi calculus is a formal language similar to the pi calculus but with useful extensions for modelling cryptographic protocols. We model several important properties, namely fairness, eligibility, privacy, receipt-freen...
متن کاملComparison of Cryptographic Verification Tools Dealing with Algebraic Properties
Recently Kuesters et al proposed two new methods using ProVerif for analyzing cryptographic protocols with Exclusive-Or and Diffie-Hellman properties. Some tools, for instance CL-Atse and OFMC, are able to deal with Exclusive-Or and Diffie-Hellman. In this article we compare time efficiency of these tools verifying some protocols of the litterature that are designed with such algebraic properties.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003