DocumentCode :
1728299
Title :
From Computationally-proved Protocol Specifications to Implementations
Author :
Cadé, David ; Blanchet, Bruno
Author_Institution :
INRIA, Ecole Normale Super., Paris, France
fYear :
2012
Firstpage :
65
Lastpage :
74
Abstract :
This paper presents a novel framework for proving specifications of security protocols in the computational model and generating runnable implementations from such proved specifications. We rely on the computationally-sound protocol verifier CryptoVerif for proving the specification, and we have implemented a compiler that translates a CryptoVerif specification into an implementation in OCaml. We have applied this compiler to the SSH Transport Layer protocol: we proved the authentication of the server and the secrecy of the session keys in this protocol and verified that the generated implementation successfully interacts with OpenSSH. The secrecy of messages sent over the SSH tunnel cannot be proved due to known weaknesses in SSH with CBC-mode encryption.
Keywords :
cryptography; formal specification; program compilers; program verification; transport protocols; CBC-mode encryption; CryptoVerif specification; OCaml; OpenSSH; SSH transport layer protocol; SSH tunnel; computationally-proved protocol specifications; computationally-sound protocol verifier; security protocols; Authentication; Computational modeling; Encryption; Java; Protocols;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Availability, Reliability and Security (ARES), 2012 Seventh International Conference on
Conference_Location :
Prague
Print_ISBN :
978-1-4673-2244-7
Type :
conf
DOI :
10.1109/ARES.2012.63
Filename :
6329273
Link To Document :
بازگشت