DocumentCode :
2325254
Title :
Proving security protocols with model checkers by data independence techniques
Author :
Roscoe, A.W.
Author_Institution :
Comput. Lab., Oxford Univ., UK
fYear :
1998
fDate :
9-11 Jun 1998
Firstpage :
84
Lastpage :
95
Abstract :
Model checkers such as FDR have been extremely effective in checking for, and finding, attacks on cryptographic protocols. Their use in proving protocols has, on the other hand, generally been limited to showing that a given small instance, usually restricted by the finiteness of some set of resources such as keys and nonces, is free of attacks. While for specific protocols there are frequently good reasons for supposing that this will find any attack, it leaves a substantial gap in the method. The purpose of this paper is to show how techniques borrowed from data independence and related fields can be used to achieve the illusion, that nodes can call upon an infinite supply of different nonces, keys, etc., even though the actual types used for these things remain finite. It is thus possible to create models of protocols in which nodes do not have to stop after a small number of runs and to claim that, within certain limits, a finite-state run on a model checker has proved that a given protocol is secure from attack. The author uses a single protocol as a case study, but believe our techniques are much more widely applicable
Keywords :
cryptography; protocols; attacks; cryptographic protocols; data independence techniques; finite-state run; keys; model checkers; nonces; security protocol proving; Combinatorial mathematics; Cryptographic protocols; Data security; Laboratories; Testing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Foundations Workshop, 1998. Proceedings. 11th IEEE
Conference_Location :
Rockport, MA
ISSN :
1063-6900
Print_ISBN :
0-8186-8488-7
Type :
conf
DOI :
10.1109/CSFW.1998.683158
Filename :
683158
Link To Document :
بازگشت