Skip to main content
Log in

An Omniscience-Free Temporal Logic of Knowledge for Verifying Authentication Protocols

  • Original Paper
  • Published:
Bulletin of the Iranian Mathematical Society Aims and scope Submit manuscript

Abstract

Since the advent of BAN logic, many logics have been proposed for verifying authentication protocols. In one line of research, scholars have presented logics that can be utilized in verifying timed requirements of the protocols. Although many temporal epistemic logics have been developed to this end, there is no complete logic of this kind to prevent logical omniscience. Thus, they may lead to misleading judgments about the properties of the protocol being analyzed. In this paper, we propose a complete and omniscience-free temporal epistemic logic for analyzing authentication protocols. The main challenging issue in devising this logic is formulating intuitive models that on one hand reflect what is naturally meant by a protocol execution and on the other hand make it possible to achieve properties such as completeness. We show that such models can build on interpreted systems and that the resulting logic is useful in analyzing authentication protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Notes

  1. For technical reasons, we need to force \(\tau \) to be finite using a finite set of atomic messages and restricting the number of interleaving concatenations and encryptions.

  2. A message is fresh if it has not been sent in any message previously [9]. If a message is unfresh, it is subject to replay attacks.

References

  1. Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). J. Cryptol. 15(2), 103–127 (2002)

    Article  MathSciNet  Google Scholar 

  2. Abadi, M., Tuttle, M.R.: A semantics for a logic of authentication. In: Proceedings of the 10th Annual ACM Symposium on Principles of Distributed Computing, pp. 201–216 (1991)

  3. Becker, M.Y., Russo, A., Sultana, N.: Foundations of logic-based trust management. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 161–175 (2012)

  4. Belardinelli, F., Lomuscio, A: Interactions between time and knowledge in a first-order logic for multi-agent systems. In: Proceedings of the 12th International Conference on the Principles of Knowledge Representation and Reasoning, pp. 38–48 (2010)

  5. Bonakdarpour, B., Hajisheykhi, R., Kulkarni, S.S.: Knowledge-based automated repair of authentication protocols. In: Proceedings of the 19th International Symposium on Formal Methods, pp. 132–147 (2014)

    Google Scholar 

  6. Boureanu, I., Cohen, M., Lomuscio, A.: Automatic verification of temporal-epistemic properties of cryptographic protocols. J. Appl. Non-Class. Logics 19(4), 463–487 (2009)

    Article  MathSciNet  Google Scholar 

  7. Boureanu, I., Jones, A.V., Lomuscio, A.: Automatic verification of epistemic specifications under convergent equational theories. In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, pp. 1141–1148 (2012)

  8. Boureanu, I., Kouvaros, P., Lomuscio, A.: Verifying security properties in unbounded multiagent systems. In: Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, pp. 1209–1217 (2016)

  9. Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18–36 (1990)

    Article  Google Scholar 

  10. Chao, L., Hui, L., Jianfeng, M.: Analysis the properties of TLS based on temporal logic of knowledge. In: Proceedings of the 5th International Conference on Information Assurance and Security, pp. 19–22 (2009)

  11. Cohen, M.: Logics of Knowledge and Cryptography: Completeness and Expressiveness. PhD Thesis, KTH, Stockholm, Sweden (2007)

  12. Cohen, M., Dam, M.: Logical omniscience in the semantics of BAN logic. In: Proceedings of the Foundations of Computer Security Workshop, pp. 121–132 (2005)

  13. Cohen, M., Dam, M.: A complete axiomatization of knowledge and cryptography. In: Proceedings of the 22nd Annual IEEE Symposium on Logic in Computer Science, pp. 77–88 (2007)

  14. Davis, E.: A proof-based approach to formalizing protocols in linear epistemic logic. PhD Thesis, Carnegie Mellon University, Pittsburgh (2014)

  15. Dechesne, F., Wang, Y.: To know or not to know: epistemic approaches to security protocol verification. Synthese 177(1), 51–76 (2010)

    Article  Google Scholar 

  16. Fagin, R., Moses, Y., Halpern, J.Y., Vardi, M.Y.: Reasoning About Knowledge. The MIT Press, Cambridge, Massachusetts (2003)

    MATH  Google Scholar 

  17. Garcia, F.D., Hasuo, I., Pieters, W., Van Rossum, P.: Provable anonymity. In: Proceedings of the ACM Workshop on Formal Methods in Security Engineering, pp. 63–72 (2005)

  18. Gong, L., Needham, R., Yahalom, R.: Reasoning about belief in cryptographic protocols. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 234–248 (1990)

  19. Governatori, G., Orgun, A.M., Liu, C.: Modal tableaux for verifying stream authentication protocols. J. Autonom. Agents Multi Agent Syst. 19(1), 53–75 (2009)

    Article  Google Scholar 

  20. J.Y. Halpern and R. Pucella, Modeling adversaries in a logic for security protocol analysis. In: Proceedings of the 1st International Conference on Formal Aspects of Security, pp. 115–132 (2003)

    Chapter  Google Scholar 

  21. Halpern, J.Y., Pucella, R.: Dealing with logical omniscience: expressiveness and pragmatics. Artif. Intell. 175(1), 220–235 (2011)

    Article  MathSciNet  Google Scholar 

  22. Hunter, A., Delgrande, J.P.: Belief change and cryptographic protocol verification. In: Proceedings of the 22th National Conference on Artificial Intelligence, pp. 427–433 (2007)

  23. Lewis, D.K.: Counterpart theory and quantified modal logic. J. Philos. 65(5), 113–126 (1968)

    Article  Google Scholar 

  24. Liu, C.: Logical foundations for reasoning about trust in secure digital communication. In: Proceedings of the Australian Joint Conference on Artificial Intelligence, pp. 333–344 (2001)

    Chapter  Google Scholar 

  25. Lomuscio, A., Woźna, B.: A complete and decidable security-specialised logic and its application to the TESLA protocol. In: Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 145–152 (2006)

  26. Lowe, G.: A family of attacks upon authentication protocols. Technical Report, Department of Mathematics and Computer Science, University of Leicester (1997)

  27. Lowe, G.: A hierarchy of authentication specifications. In: Proceedings of 10th Computer Security Foundations Workshop, pp. 31–43 (1997)

  28. Luo, X., Chen, Y., Gu, M., Wu, L.: Model checking Needham-Schroeder security protocol based on temporal logic of knowledge. In: Proceedings of the International Conference on Networks Security, Wireless Communications and Trusted Computing, pp. 551–554 (2009)

  29. Ma, J., Orgun, M., Adi, K.: An analytic tableau calculus for a temporalised belief logic. J. Appl. Logic 9(4), 289–304 (2011)

    Article  MathSciNet  Google Scholar 

  30. Ma, J., Orgun, M.A.: Formalising theories of trust for authentication protocols. Inf. Syst. Front. 10(1), 19–32 (2008)

    Article  Google Scholar 

  31. Ma, J., Orgun, M.A., Sattar, A.: Analysis of authentication protocols in agent-based systems using labeled tableaux. IEEE Trans. Syst. Man Cybern. B Cybern. 39(4), 889–900 (2009)

    Article  Google Scholar 

  32. Ma, J., Schewe, K.: A temporalised belief logic for reasoning about authentication protocols. In: Proceedings of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1721–1728 (2012)

  33. Masalagiu, C., Alaib, V.: Logic engineering with applications to security. In: Proceedings of the Romanian Academy Series A-mathematics Physics Technical Sciences Information Science, pp. 141–148 (2012)

  34. Orgun, M.A., Ma, J., Liu, C., Governatori, G.: Analysing stream authentication protocols in autonomous agent-based systems. In: Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, pp. 325–332 (2006)

  35. Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 56–73 (2000)

  36. Syverson, P.F., Van Oorschot, P.C.: On unifying some cryptographic protocol logics. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 14–28 (1994)

  37. van Eijck, J., Gattinger, M.: Elements of epistemic crypto logic. In: Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, pp. 1795–1796 (2015)

  38. Yanjing, W.: Epistemic Modelling and Protocol Dynamics. PhD Thesis, Universiteit van Amsterdam (2010)

Download references

Acknowledgements

The authors would like to take this opportunity to thank Prof. Massoud Pourmahdian for his valuable comments in this research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. S. Fallah.

Additional information

Communicated by Ali Enayat.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ahmadi, S., Fallah, M.S. An Omniscience-Free Temporal Logic of Knowledge for Verifying Authentication Protocols. Bull. Iran. Math. Soc. 44, 1243–1265 (2018). https://doi.org/10.1007/s41980-018-0087-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41980-018-0087-9

Keywords

Mathematics Subject Classification

Navigation