Title :
The Simplified Inductive Approach to Verifying Security Protocols
Author :
Juan, Wang ; Yajie, Zhou ; Huanguo, Zhang
Author_Institution :
Coll. of Comput., Wuhan Univ., Wuhan
Abstract :
The inductive approach has been used successfully to analyse local area network protocols, Internet protocols, e-commerce protocols and smart card protocols, But the theorems proofs method is very complex and is very difficult to master. lt requires that a user must guide the proof process, and select the tactic to be applied etc. Proofs are cumbersome and security properties are not built into the logic but proven within it, making it difficult to give an account of proof discovery. We simplified Paulson´s inductive approach referring to the idea of belief logic. Our method formulates the main protocol property based on belief logic. If proven, these guarantees can be combined to provide a story as to why the protocol achieves security. Otherwise, the unproven goals may be used to uncover hidden assumptions or attacks.
Keywords :
cryptographic protocols; local area networks; theorem proving; Internet protocols; Paulson inductive approach; belief logic; e-commerce protocols; local area network protocols; proof discovery; security protocols; smart card protocols; theorem proofs method; Computer networks; Computer security; Educational institutions; Electronic commerce; History; IP networks; Local area networks; Logic; Protocols; Smart cards; belief logic; inductive approach; security protocol;
Conference_Titel :
Electronic Commerce and Security, 2008 International Symposium on
Conference_Location :
Guangzhou City
Print_ISBN :
978-0-7695-3258-5
DOI :
10.1109/ISECS.2008.199