Validation of Cryptographic Protocols by Efficient Automated Testing
نویسندگان
چکیده
We present a method for validating cryptographic protocols. The method can find flaws which are inherent i~l the design of the protocol as well as flaws arising from the particular implementation of the protocol. The latter possibility arises from the fact that there is no universally accepted standard for describing either the cryptographic protocols themselves or their implementation. Thus, security call (and in practice does) depend on decisions made by tlm implementer, who may not have the necessary expertise. Our method relics on automatic theorem proving tools. Specifically, wc used "Otter", an automatic theorem proving software developed at Argonne National Laboratories.
منابع مشابه
Sigrid Gürgens , René Peralta Efficient Automated Testing of Cryptographic Protocols
We present a search method for detecting potential security aws in cryptographic protocols. The method can nd aws which are inherent in the design of the protocol as well as aws arising from the particular implementation of the protocol. The latter possibility arises from the fact that there is no universally accepted standard for describing either the cryptographic protocols themselves or thei...
متن کاملIntegrating Verification, Testing, and Learning for Cryptographic Protocols
The verification of cryptographic protocol specifications is an active research topic and has received much attention from the formal verification community. By contrast, the black-box testing of actual implementations of protocols, which is, arguably, as important as verification for ensuring the correct functioning of protocols in the “real” world, is little studied. We propose an approach fo...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملOn the automated implementation of modal logics used to verify security protocols
Abstract: Formal verification provides a rigid and thorough means of evaluating the correctness of cryptographic protocols so that even subtle defects can be identified. As the application of formal techniques is highly involved, software has been developed in order to facilitate protocol verification. Protocol weaknesses or flaws can thus be identified and corrected during the design process. ...
متن کاملVerifying Regular Trace Properties of Security Protocols with Explicit Destructors and Implicit Induction
We present a procedure for the verification of cryptographic protocols based on a new method for automatic implicit induction theorem proving for specifications made of conditional and constrained rewrite rules. The method handles axioms between constructor terms which are used to introduce explicit destructor symbols for the specification of cryptographic operators. Moreover, it can deal with ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000