Real Cryptographic Protocol with an Insider Attacker: Improving Techniques for Proving Undecidability of Checking Security Goals

نویسندگان

  • Zhiyao Liang
  • Rakesh M. Verma
چکیده

Existing undecidability proofs of checking secrecy of cryptographic protocols have the limitations ofnot considering protocols common in literature, which are in the form of communication sequences, sinceonly protocols as non-matching roles are considered, and not considering an attacker who is an insidersince only an outsider attacker is considered. Therefore the complexity of checking the realistic attacks,such as the attack to the public key Needham-Schroeder protocol, is unknown. The limitations have beenobserved independently and described similarly by Froschle in a recently published paper [1], where twoopen problems are posted. This paper investigates these limitations, and we present a generally applicableapproach by reductions with novel features from the reachability problem of 2-counter machines, and wesolve the two open problems. We also prove the undecidability of checking authentication which is thefirst detailed proof to the best of our knowledge. A unique feature of the proof is to directly addressthe secrecy and authentication goals as defined for the public key Needham-Schroeder protocol, whoseattack has motivated many researches of formal verification of security protocols. This report covers ourworkshop paper [2] and provide more details of modeling and proofs. ∗Research supported in part by NSF grants CCF 0306475 and DUE 0313880.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

Oh!... is it really you? : using rank functions to verify authentication protocols

A security protocol is a mechanism designed to allow secure communications through an insecure medium, even when that medium is controlled by a hostile attacker. Historically, approaches to analysis of security protocols have fallen into two broad categories: model checking and theorem proving. Each has its strengths, but the weaknesses of each are all too apparent. Model checking suffers from ...

متن کامل

Is it possible to decide whether a cryptographic protocol is secure or not ?

We consider the so called “cryptographic protocols” whose aim is to ensure some security properties when communication channels are not reliable. Such protocols usually rely on cryptographic primitives. Even if it is assumed that the cryptographic primitives are perfect, the security goals may not be achieved: the protocol itself may have weaknesses which can be exploited by an attacker. We sur...

متن کامل

Mining Inconsistent Secure Messages Toward Analyzing Security Protocols

Traditional approaches such as theorem proving and model checking have been successfully used to analyze security protocols. Ideally, they assume the data communication is reliable and require the user to predetermine authentication goals. However, missing and inconsistent data have been greatly ignored, and the increasingly complicated security protocol makes it difficult to predefine such goa...

متن کامل

Probabilistic model checking for the quantification of DoS security threats

Secure authentication features of communication and electronic commerce protocols involve computationally expensive and memory intensive cryptographic operations that have the potential to be turned into denial-of-service (DoS) exploits. Recent proposals attempt to improve DoS resistance by implementing a trade-off between the resources required for the potential victim(s) with the resources us...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008