DocumentCode
2788726
Title
Formal Analysis of Time-Dependent Cryptographic Protocols in Real-Time Maude
Author
Ölveczky, Peter Csaba ; Grimeland, Martin
Author_Institution
Dept. of Informatics, Oslo Univ.
fYear
2007
fDate
26-30 March 2007
Firstpage
1
Lastpage
8
Abstract
This paper investigates the suitability of applying the general-purpose real-time Maude tool to the formal specification and model checking analysis of time-dependent cryptographic protocols. We restrict the intruders so that they become non-Zeno, and propose a complete analysis method for finding attacks that are reachable from the initial state. Our method has been used on the benchmark wide-mouthed frog (WMF) and Kerberos protocols, on which we can find all the well known flaws in short time. We use the WMF protocol to illustrate formal specification and the use of our method to analyze timed authentication properties.
Keywords
cryptographic protocols; formal specification; message authentication; Kerberos protocol; formal specification; message authentication; model checking analysis; real-time Maude tool; time-dependent cryptographic protocol; wide-mouthed frog protocol; Algorithm design and analysis; Analytical models; Authentication; Cryptographic protocols; Cryptography; Formal specifications; Informatics; Logic; Reachability analysis; Real time systems;
fLanguage
English
Publisher
ieee
Conference_Titel
Parallel and Distributed Processing Symposium, 2007. IPDPS 2007. IEEE International
Conference_Location
Long Beach, CA
Print_ISBN
1-4244-0910-1
Electronic_ISBN
1-4244-0910-1
Type
conf
DOI
10.1109/IPDPS.2007.370355
Filename
4228083
Link To Document