首页> 外文期刊>Journal of symbolic computation >Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols
【24h】

Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols

机译:自动验证密码协议线性逻辑规范的保密性

获取原文
获取原文并翻译 | 示例
           

摘要

In this paper we investigate the applicability of a bottom-up evaluation strategy for a first-order fragment of affine linear logic that we introduced in Theory Prac. Log. Program. 4 (2004) 1 for the purposes of automated verification of secrecy in cryptographic protocols. Following the Proceedings of the 12th Computer Security Foundations Workshop (1999) 55, we use multi-conclusion clauses to represent the behaviour of agents in a protocol session, and we adopt the Dolev-Yao intruder model. In addition, universal quantification provides a formal and declarative way to express creation of nonces. Our approach is well suited to verifying properties which can be specified by means of minimal conditions. Unlike traditional approaches based on model checking, we can reason about parametric, infinite-state systems; thus we do not pose any limitation on the number of parallel runs of a protocol. Furthermore, our approach can be used both to find attacks and to verify secrecy for a protocol. We apply our method to analyse several classical examples of authentication protocols. Among them we consider the ffgg protocol (Proceedings of the Workshop on Formal Methods and Security Protocols (1999)). This protocol is a challenging case study in that it is free from sequential attacks, whereas it suffers from parallel attacks that occur only when at least two sessions are run in parallel. The other case studies are of the Otway-Rees protocol and several formulations of the Needham-Schroeder protocol.
机译:在本文中,我们研究了自下而上的评估策略对我们在Theory Prac中引入的仿射线性逻辑的一阶片段的适用性。日志。程序。 4(2004)1,用于自动验证密码协议中的保密性。根据第十二届计算机安全基础研讨会(1999)55的论文集,我们使用多结论子句来表示代理在协议会话中的行为,并且采用了Dolev-Yao入侵者模型。此外,通用量化为表达随机数的创建提供了一种形式化和声明性的方式。我们的方法非常适合验证可以通过最小条件指定的属性。与基于模型检查的传统方法不同,我们可以推理参数化的无限状态系统。因此,我们对协议的并行运行次数没有任何限制。此外,我们的方法可用于发现攻击和验证协议的保密性。我们应用我们的方法来分析认证协议的几个经典示例。其中我们考虑了ffgg协议(正式方法和安全协议研讨会的记录(1999))。该协议是一个具有挑战性的案例研究,因为它没有顺序攻击,而只有并行运行至少两个会话时才会遭受并行攻击。其他案例研究涉及Otway-Rees协议和Needham-Schroeder协议的几种表述。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号