Skip to main content

Verifying Multi-party Authentication Using Rank Functions and PVS

  • Conference paper
Book cover Formal Aspects in Security and Trust (FAST 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5491))

Included in the following conference series:

  • 475 Accesses

Abstract

In this paper we present a fully formal correctness proof of a multi-party version of the Needham-Schroeder-Lowe public key authentication protocol. As the protocol allows for an arbitrary number of participants, the model consisting of all possible protocol executions exceeds any bounds imposed by model checking methods. By modelling the protocol in the CSP-framework and using the Rank Theorem we obtain an abstraction level that allows to give a correctness proof in PVS for the protocol with respect to authentication, for the protocol running in parallel in multiple instantiations, possibly with different numbers of agents for each instance.

This specific result shows how, more generally, the formalisation in CSP and application of the theorem prover PVS make full formal verification of multi-party security protocols possible.

Research funded by the Dutch Organisation for Scientific Research (NWO), project number 612.000.528: Verification and Epistemics of Multi-Party Protocol Security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lowe, G.: Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147–166. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  2. Owre, S., Rushby, J.M., Shankar, N.: Prototype Verification System, http://www.csl.sri.com/

  3. Cremers, C., Mauw, S.: A Family of Multi-Party Authentication Protocols. In: First Benelux Workshop on Information and System Security (WISSec) (2006)

    Google Scholar 

  4. Cremers, C.J.F., Mauw, S., de Vink, E.P.: Injective Synchronisation: an Extension of the Authentication Hierarchy. Theor. Comput. Sci. 367(1-2), 139–161 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  5. Cremers, C.: Scyther tool, http://people.inf.ethz.ch/cremersc/scyther/

  6. Cremers, C.: Scyther – Semantics and Verification of Security Protocols. PhD thesis, Technische Universiteit Eindhoven (November 2006)

    Google Scholar 

  7. Schneider, S.: Verifying Authentication Protocols with CSP. In: CSFW 10, pp. 3–17. IEEE Computer Society Press, Los Alamitos (1997)

    Google Scholar 

  8. Heather, J., Schneider, S.: A Decision Procedure for the Existence of a Rank Function. Journal of Computer Security 13(2), 317–344 (2005)

    Article  Google Scholar 

  9. Ryan, P., Schneider, S.: Modelling and Analysis of Security Protocols. Addison-Wesley, Reading (2001)

    Google Scholar 

  10. Schneider, S., Delicata, R.: Verifying Security Protocols: An Application of CSP. In: Abdallah, A.E., Jones, C.B., Sanders, J.W. (eds.) Communicating Sequential Processes. LNCS, vol. 3525, pp. 243–263. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  11. Evans, N., Schneider, S.: Verifying Security Protocols with PVS: Widening the Rank Function Approach. Journal of Logic and Algebraic Programming 64(2), 253–284 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  12. Verhoeven, R.: PVS-code for this paper, http://www.win.tue.nl/~fdechesn/

  13. Shaikh, S., Bush, V.: Analysing the Woo-Lam Protocol Using CSP and Rank Functions. Journal of Research and Practice in Information Technology 38(1), 19–29 (2006)

    Google Scholar 

  14. Delicata, R., Schneider, S.A.: A Formal Model of Diffie-Hellman Using CSP and Rank Functions. Technical Report CSD-TR-03-05, Department of Computer Science, Royal Holloway, University of London (2003)

    Google Scholar 

  15. Pereira, O., Quisquater, J.J.: Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols. In: CSFW 17, pp. 16–19. IEEE Computer Society Press, Los Alamitos (2004)

    Google Scholar 

  16. Layouni, M., Hooman, J., Tahar, S.: On the correctness of an intrusion-tolerant group communication protocol. In: Geist, D., Tronci, E. (eds.) CHARME 2003. LNCS, vol. 2860, pp. 231–246. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  17. Paulson, L.C.: The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security 6(1-2), 85–128 (1998)

    Article  Google Scholar 

  18. Shaikh, S.A., Bush, V.J., Schneider, S.A.: Specifying authentication using signal events in CSP. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol. 3822, pp. 63–74. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  19. Roscoe, A.W., Hoare, C.A.R., Bird, R.: The Theory and Practice of Concurrency. Prentice Hall, NJ (1997)

    Google Scholar 

  20. Verhoeven, R.: Proving Correctness of a Multi-Party Authentication Protocol with Rank Functions. Master’s thesis, Technische Universiteit Eindhoven (2007)

    Google Scholar 

  21. Mauw, S., Bos, V.: Drawing Message Sequence Charts with LaTeX. TUGBoat 22(1-2), 87–92 (2001)

    Google Scholar 

  22. Heather, J., Lowe, G., Schneider, S.: How to prevent type flaw attacks on security protocols. In: CSFW 13, pp. 255–268. IEEE Computer Society Press, Los Alamitos (2000)

    Google Scholar 

  23. Dolev, D., Yao, A.: On the Security of Public Key Protocols. IEEE Transactions on Information Theory 29(2), 198–208 (1983)

    Article  MathSciNet  MATH  Google Scholar 

  24. Lowe, G.: A Hierarchy of Authentication Specifications. In: CSFW 10, pp. 31–44. IEEE Computer Society Press, Los Alamitos (1997)

    Google Scholar 

  25. Meier, S.: A Formalization of an Operational Semantics of Security Protocols. Diploma thesis, ETH Zurich (August 2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Verhoeven, R., Dechesne, F. (2009). Verifying Multi-party Authentication Using Rank Functions and PVS. In: Degano, P., Guttman, J., Martinelli, F. (eds) Formal Aspects in Security and Trust. FAST 2008. Lecture Notes in Computer Science, vol 5491. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01465-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-01465-9_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-01464-2

  • Online ISBN: 978-3-642-01465-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics