Hybrid Mobile Security Protocol: Formal Verification using a New Modal Logic

نویسنده

  • T. NEWE
چکیده

Hybrid cryptographic security protocols find applications in many areas of communications, none more demanding than in the mobile security sector. In recent years a number of hybrid cryptographic security protocols have been proposed for use with 3G mobile systems. These include the ASPeCT [1] and Boyd-Park [2] security protocol. These protocols use a public key algorithm to exchange a secret session key for use with a symmetric algorithm, thereby removing the need for ultra reliable key servers. In order to provide assurance that these protocols are verifiably secure and trustworthy it is necessary to perform a formal verification on their design specifications. In this paper the Boyd-Park hybrid mobile security protocol is formally verified using a new extended modal logic technique. This logic is based on the Coffey-Saidha logic [3], which was designed to verify public key based protocols only. The logic presented in this paper is a substantial extension to the original. As a result of this verification a modification to the original Boyd-Park protocol is suggested. Key-Words: Formal methods, verification logic, hybrid security protocol, 3G mobile

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Formal verification logic for hybrid security protocols

Security communication protocols generally start with an authentication phase where the identities of the involved parties are established. Next a session key is generated for use with some symmetric cryptographic algorithm to secure the actual transmission. In addition to the above, a mobile system may also require location privacy, link-security and/or end-to-end security. These extra require...

متن کامل

On the security analysis of authenticated group key exchange protocols for low-power mobile devices

Secure communications are paramount in today’s wireless network system, where highly sensitive information is delivered through mobile applications. Cryptographic protocols are used to provide security services, such as confidentiality, authentication and non-repudiation. The design of secure group key exchange protocols is one of many important security issues in wireless networks. Recently, B...

متن کامل

Formal verification : an imperative step in the design of security protocols q

Traditionally, security protocols have been designed and verified using informal techniques. However, the absence of formal verification can lead to security errors remaining undetected. Formal verification techniques, on the other hand, provide a systematic way of discovering protocol flaws. This paper discusses the process of formal verification using modal logics. The verification process is...

متن کامل

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

An Empirical Analysis of Automated Verification of Wireless Security Protocols

Formal verification of security protocols is an important step in the design of security protocols. It helps to reduce the potential of designing faulty protocols and thus increases the confidence in their use. Automated techniques reduce the potential for human errors during verification. This paper presents an empirical study of an automated proving system on the analysis of two wireless comm...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002