DocumentCode :
3342112
Title :
Formal automatic verification of authentication cryptographic protocols
Author :
Debbabi, M. ; Mejri, M. ; Tawbi, N. ; Yahmadi, I.
Author_Institution :
Dept. of Comput. Sci., Laval Univ., Que., Canada
fYear :
1997
fDate :
12-14 Nov. 1997
Firstpage :
50
Lastpage :
59
Abstract :
We address the formal analysis of authentication cryptographic protocols. We present a new verification algorithm that generates from the protocol description the set of possible flaws, if any, as well as the corresponding attack scenarios. This algorithm does not require any property or invariant specification. The algorithm involves three steps: extracting the protocol roles, modeling the intruder abilities and verification. In addition to the classical known intruder computational abilities such as encryption and decryption, we also consider those computations that result from different instrumentations of the protocol. The intruder abilities are modeled as a deductive system. The verification is based on the extracted roles as well as the deductive system. It consists in checking whether the intruder can answer all the challenges uttered by a particular role. If it is the case, an attack scenario is automatically constructed. The extracted proof system does not ensure the termination of deductions. For that purpose, we present a general transformation schema that allows one to automatically rewrite the non-terminating proof system into a terminating one. The transformation schema is shown to be correct. To exemplify the usefulness and efficiency of our approach, we illustrate it on the Woo and Lam (1992) authentication protocol. Abadi and Needham have shown that the protocol is insecure and they proposed a new corrected version. Thanks to this method we have discovered new unknown flaws in the Woo and Lam protocol and in the corrected version of Abadi and Needham.
Keywords :
cryptography; formal verification; message authentication; protocols; attack scenario; attack scenarios; authentication cryptographic protocols; computations; decryption; deduction termination; deductive system; encryption; formal analysis; formal automatic verification; intruder abilities; nonterminating proof system; specification; Authentication; Computer errors; Computer science; Computer security; Cryptographic protocols; Cryptography; Instruments; Performance analysis; Surges;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Formal Engineering Methods., 1997. Proceedings., First IEEE International Conference on
Conference_Location :
Hiroshima, Japan
Print_ISBN :
0-8186-8002-4
Type :
conf
DOI :
10.1109/ICFEM.1997.630399
Filename :
630399
Link To Document :
بازگشت