首页> 外文会议>Foundations and applications of security analysis : Revised selected papers >Finite Models in FOL-Based Crypto-Protocol Verification
【24h】

Finite Models in FOL-Based Crypto-Protocol Verification

机译:基于FOL的加密协议验证中的有限模型

获取原文
获取原文并翻译 | 示例

摘要

Cryptographic protocols can only be secure under certain inequality assumptions. Axiomatizing these inequalities explicitly is problematic: stating too many inequalities may impair soundness of the verification approach. To address this issue, we investigate an alternative approach (based on first-order logic) that does not require inequalities to be axiomatized. A derivation of the negated security property exhibits a protocol attack, and absence of a derivation amounts to absence of the investigated kind of attack.rnWe establish a fragment of FOL strictly greater than Horn formulas in which the approach is sound. We then show how to use finite model generation in this context to prove the absence of attacks. To demonstrate its practicality, the approach is applied to several well-known protocols, including ones relying on non-trivial algebraic properties. We show that it can be used to deal with infinitely many principals (and thus sessions).
机译:加密协议只能在某些不平等假设下才是安全的。明确地公理化这些不平等是有问题的:陈述过多的不平等可能会削弱验证方法的可靠性。为了解决这个问题,我们研究了一种不需将不等式公理化的替代方法(基于一阶逻辑)。否定的安全属性的派生表现出协议攻击,而缺少派生则等于不存在所研究的攻击类型。我们建立了一个FOL片段,该片段严格大于采用正确方法的Horn公式。然后,我们展示了如何在这种情况下使用有限模型生成来证明没有攻击。为了证明其实用性,该方法被应用于几种众所周知的协议,包括那些依赖于非平凡代数性质的协议。我们证明了它可以用于处理无限多个主体(以及会话)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号