• DocumentCode
    2788726
  • Title

    Formal Analysis of Time-Dependent Cryptographic Protocols in Real-Time Maude

  • Author

    Ölveczky, Peter Csaba ; Grimeland, Martin

  • Author_Institution
    Dept. of Informatics, Oslo Univ.
  • fYear
    2007
  • fDate
    26-30 March 2007
  • Firstpage
    1
  • Lastpage
    8
  • Abstract
    This paper investigates the suitability of applying the general-purpose real-time Maude tool to the formal specification and model checking analysis of time-dependent cryptographic protocols. We restrict the intruders so that they become non-Zeno, and propose a complete analysis method for finding attacks that are reachable from the initial state. Our method has been used on the benchmark wide-mouthed frog (WMF) and Kerberos protocols, on which we can find all the well known flaws in short time. We use the WMF protocol to illustrate formal specification and the use of our method to analyze timed authentication properties.
  • Keywords
    cryptographic protocols; formal specification; message authentication; Kerberos protocol; formal specification; message authentication; model checking analysis; real-time Maude tool; time-dependent cryptographic protocol; wide-mouthed frog protocol; Algorithm design and analysis; Analytical models; Authentication; Cryptographic protocols; Cryptography; Formal specifications; Informatics; Logic; Reachability analysis; Real time systems;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Parallel and Distributed Processing Symposium, 2007. IPDPS 2007. IEEE International
  • Conference_Location
    Long Beach, CA
  • Print_ISBN
    1-4244-0910-1
  • Electronic_ISBN
    1-4244-0910-1
  • Type

    conf

  • DOI
    10.1109/IPDPS.2007.370355
  • Filename
    4228083