Title :
Analyzing Cryptographic Protocols Using AI Planning Technology
Author :
Wang, Yadi ; Zhou, Zhiyong ; Zhao, Yu ; Han, Jihong
Author_Institution :
Zhengzhou Inf. Sci. & Technol. Inst., Zhengzhou, China
Abstract :
In this paper, protocol insecurity problem is described, and AI planning system is used to solve the problem. Based on running characteristics and laws of cryptographic protocols, a planning-based formal model for cryptographic protocol analysis is presented, after its first-order syntax, formal definition and operational semantics are given, formalization for protocol honest agents, the intruder and protocol insecurity goals are presented, and a SAT-based solving algorithm for attack planning is proposed.
Keywords :
cryptographic protocols; planning (artificial intelligence); artificial intelligence; cryptographic protocols; planning; protocol insecurity; Artificial intelligence; Cryptographic protocols; Cryptography; Electronic commerce; Information analysis; Information science; Information security; Public key; State-space methods; Technology planning; basic message element; cryptographic protocol; formalization; planning; protocol insecurity problem; solving algorithm;
Conference_Titel :
Electronic Commerce and Security, 2009. ISECS '09. Second International Symposium on
Conference_Location :
Nanchang
Print_ISBN :
978-0-7695-3643-9
DOI :
10.1109/ISECS.2009.48