• DocumentCode
    498452
  • Title

    Analyzing Cryptographic Protocols Using AI Planning Technology

  • Author

    Wang, Yadi ; Zhou, Zhiyong ; Zhao, Yu ; Han, Jihong

  • Author_Institution
    Zhengzhou Inf. Sci. & Technol. Inst., Zhengzhou, China
  • Volume
    1
  • fYear
    2009
  • fDate
    22-24 May 2009
  • Firstpage
    16
  • Lastpage
    20
  • Abstract
    In this paper, protocol insecurity problem is described, and AI planning system is used to solve the problem. Based on running characteristics and laws of cryptographic protocols, a planning-based formal model for cryptographic protocol analysis is presented, after its first-order syntax, formal definition and operational semantics are given, formalization for protocol honest agents, the intruder and protocol insecurity goals are presented, and a SAT-based solving algorithm for attack planning is proposed.
  • Keywords
    cryptographic protocols; planning (artificial intelligence); artificial intelligence; cryptographic protocols; planning; protocol insecurity; Artificial intelligence; Cryptographic protocols; Cryptography; Electronic commerce; Information analysis; Information science; Information security; Public key; State-space methods; Technology planning; basic message element; cryptographic protocol; formalization; planning; protocol insecurity problem; solving algorithm;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Electronic Commerce and Security, 2009. ISECS '09. Second International Symposium on
  • Conference_Location
    Nanchang
  • Print_ISBN
    978-0-7695-3643-9
  • Type

    conf

  • DOI
    10.1109/ISECS.2009.48
  • Filename
    5209720