DocumentCode :
2445640
Title :
On the representation and verification of cryptographic protocols in a theory of action
Author :
Delgrande, James P. ; Hunter, Aaron ; Grote, Torsten
Author_Institution :
Sch. of Comput. Sci., Simon Fraser Univ., Burnaby, BC, Canada
fYear :
2010
fDate :
17-19 Aug. 2010
Firstpage :
39
Lastpage :
45
Abstract :
Cryptographic protocols are usually specified in an informal, ad hoc language, with crucial elements, such as the protocol goal, left implicit. We suggest that this is one reason that such protocols are difficult to analyse, and are subject to subtle and nonintuitive attacks. We present an approach for formalising and analysing cryptographic protocols in a theory of action, specifically the situation calculus. Our thesis is that all aspects of a protocol must be explicitly specified. We provide a declarative specification of underlying assumptions and capabilities in the situation calculus. A protocol is translated into a sequence of actions to be executed by the principals, and a successful attack is an executable plan by an intruder that compromises the specified goal. Our prototype verification software takes a protocol specification, translates it into a high-level situation calculus (Golog) program, and outputs any attacks that can be found. We describe the structure and operation of our prototype software, and discuss performance issues.
Keywords :
cryptographic protocols; program verification; ad hoc language; cryptographic protocols; high-level situation calculus program; prototype verification software; Calculus; Chromium; Cryptographic protocols; Cryptography; Software; Vocabulary;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Privacy Security and Trust (PST), 2010 Eighth Annual International Conference on
Conference_Location :
Ottawa, ON
Print_ISBN :
978-1-4244-7551-3
Electronic_ISBN :
978-1-4244-7549-0
Type :
conf
DOI :
10.1109/PST.2010.5593236
Filename :
5593236
Link To Document :
بازگشت