Verification of cryptographic protocols : A bound on the number of agents

نویسنده

  • Antoine Dallon
چکیده

Nowadays, cryptography and security protocols are used everywhere, and public confidence in credit cards or electronic voting relies on their trustworthiness. As flaws can stay unremarked during several years, the scientific community has undertaken the automation of their research through formal methods, or to prove the protocols secure. Two families of models have been introduced : computational models are based on real properties of cryptographic primitives whereas symbolic models, which I used, assume perfect cryptography but allow more automation. In each model, security properties should hold for an arbitrary number of agents involved in an unbounded number of sessions. This together with the unbounded size of the messages, makes the verification problem undecidable. Works verification of security properties in the symbolic model search for decidable classes of protocols and properties, or try to improve automated research of flaws.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

متن کامل

Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method

Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...

متن کامل

Vérifier les protocoles cryptographiques

A cryptographic protocol is a description of message exchanges on a network. The verification of such programs has become crucial. We propose here a synthesis of decidability and undecidability results for secrecy and authentication properties. We consider several restrictions: bound on the number of sessions, on the size of messages, on the number of copies at each transition, etc. Moreover, w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015