Abstract
A state-of-the-art review is presented concerning formal methods for the design and analysis of cryptographic protocols over open networks and distributed systems. The most commonly followed approaches to the applications of related formal methods are reviewed, followed by the examinationof robustness principles and application limitations as rules of thumb. Finally the modern trends for the use of formal methods in the design of new cryptographic protocols are discussed.
Chapter PDF
References
Abadi M., Needham R., (1994) Prudent Engineering Practice for Cryptographic protocols, Proceedings of the 1994 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, pp. 122–136.
Abadi M., Tuttle M., (1991) A Semantics for a Logic of Authentication, Proceedings of the Tenth ACM Symposium on Principles of Distributed Computing, pp. 201–216, ACM Press.
Anderson R., (1992) A Second Generation Wallet, ESORICS ′92 Proceedings of the Second European Symposium on Research in Computer Security, Springer Verlag, pp. 411–418.
Anderson R., Needham R., (1996) Programming Satan’s Computer, Lecture Notes in Computer Science LNCS 1000, Springer Verlag, pp. 426–440.
Boyd C., Mao W., (1994) Designing Secure Key Exchange Protocols, ESORICS ′94, Proceedings of the Third European Symposium on Research in Computer Security, Springer Verlag, pp. 93–105.
Brackin S., (1997a) An Interface Specification Language for Automatically Analyzing Cryptographic Protocols, Proceedings of the 1997 Symposium on Network and Distributed System Security, pp. 40–51, IEEE Computer Society Press.
Brackin S., (1997b) Automatic Formal Analyses of Cryptographic Protocols, private communication.
Brackin S., (1996a) A HOL Extension of GNY for Automatically Analyzing Cryptographic Protocols, Proceedings of the 1996 IEEE Computer Security Foundations Workshop/X, pp. 62–76, IEEE Computer Society Press.
Brackin S., (1996b) Automatic Formal Analyses of Cryptographic Protocols, Proceedings of the 19th National Conference on Information Systems Security, Baltimore, MD, IEEE.
Burns J., Mitchell C., (1990) A Security Scheme for Resource Sharing over a Network, Computers and Security, Vol. 19, pp. 67–76.
Burrows M., Abadi M., Needham R., (1990) A Logic of Authentication, ACM Transactions on Computer Systems, 8(1), pp. 18–36.
Carlsen U., (1994) Generating Formal Cryptographic Protocol Specifications, Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 137–146, IEEE Computer Society Press.
CCITT (1988) CCITT X.509, The Directory - An Authentication framework, CCITT.
Denning D., Sacco G., (1981) Timestamps in Key Distribution Protocols, Communications of the ACM, Vol. 24, No. 8, pp. 533–536.
Dolev D., Yao A., (1983) On the Security of Public Key Protocols, IEEE Transactions on Information Theory, 29(2), pp. 198–208.
Gollmann D., (1996) What do we mean by Entity Authentication, Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 46–54, IEEE Computer Society Press.
Gong L., Lomas T., Needham R., Saltzer J., (1993) Protecting Poorly Chosen Secrets from Guessing Attacks, IEEE Journal on Selected Areas in Communications, Vol. 11, No. 5, pp. 648–656.
Gong L., Needham R., Yahalom R., (1990) Reasoning about Belief in Cryptographic Protocols, Proceedings of the 1990 IEEE Symposium on Security and Privacy, pp. 234–248, IEEE Computer Society Press.
Gong L., Syverson P., (1995) Fail-Stop Protocols: An Approach to Designing Secure Protocols, pre-Proceedings of DCCA-5 Fifth International Working Conference on Dependable Computing for Critical Applications, pp. 45–55.
Gordon M., Melham T., (1993) Introduction to HOL: A Theorem Proving Environment for Higher Order Logic, Cambridge University Press, Cambridge, UK.
Gritzalis S. (1996) The BAN logic for the analysis of authentication protocols in distributed systems: A review, In Proceedings of the 1st meeting of the IKAROS human network for the Security, Quality, and Reliability in Information & Communication Technologies (in Greek).
Heintze N., Tygar J., (1994) A Model for Secure Protocols and their Compositions, Proceedings of the 1994 IEEE Symposium on Security and Privacy, pp. 2–13, IEEE Computer Society Press.
Kailar R., (1995) Reasoning about Accountability in Protocols for Electronic Commerce, Proceedings of the 1995 IEEE Symposium on Security and Privacy, pp. 236–250, IEEE Computer Society Press.
Kemmerer R., (1989) Analyzing encryption protocols using formal verification techniques, IEEE Journal on Selected Areas in Communications, 7 (4), pp. 448–457.
Kemmerer R., Meadows C., and Millen J. (1994) Three Systems for Cryptographic Protocol Analysis, Journal of Cryprology (7), pp. 79–130.
Kessler V., Wedel G., (1994) AUTLOG-An advanced Logic of Authentication, Proceedings of the 1994 IEEE Computer Security Foundations Workshop VII, pp. 90–99.
Lichota R., Hammonds G., Brackin S., (1996) Verifying the Correctness of Cryptographic Protocols using Convince, Proceedings of the 12th IEEE Computer Security Applications Conference, pp. 117–128, IEEE Computer Society Press.
Lowe D., (1996) Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR, In Proceedings of TA CAS, Springer Verlag, pp. 147–166.
Mao W., (1995) An Augmentation of BAN-like Logics, Proceedings of the 1995 IEEE Computer Security Foundation s Workshop VIII, pp. 44–56, IEEE Computer Society Press.
Mao W., Boyd C., (1993) Towards formal analysis of security protocols, Proceedings of the 1993 IEEE Computer Security Foundations Workshop VI, pp. 147–158, IEEE Computer Society Press.
Meadows C., (1992) Applying Formal Methods to the Analysis of a Key-Management Protocol, Journal of Computer Security, vol. I, pp. 5–35.
Meadows C., (1995) Formal Verification of Cryptographic Protocols: A Survey, Advances in Cryptology, ASIA CRYPT ′94. Proceedings, Springer Verlag, pp. 133–150.
Meadows C., (1996) Language Generation and Verification in the NRL Protocol Analyzer, Proceedings of the 1996 IEEE Computer Security Foundation Workshop IX, pp. 48–61, IEEE Computer Societ Press.
Millen J., (1997) Common Authentication Protocol Specification Language, http://lwww.mitre.org/research/capsl.
Millen J., (1995) The Interrogator Model, Proceedings of the 1995 IEEE Symposium on Security and Privacy, pp. 251–260, IEEE Computer Society Press.
Millen J., Clark S., Freedman S., (1987) The Interrogator: Protocol Security Analysis, IEEE Transactions on Software Engineering, Vol. 13, No. 2.
Millen J., Neuman C., Schiller J., Saltzer J., (1987) Kerberos Authentication and Authorization system, Project Athena Technical Plan, Section E.2. 1. M.I.T., MA.
Needham R., Schroeder M., (1978) Using Encryption for Authentication in large networks of computers, Communications of the ACM, 21 (12), pp. 993–999.
Needham R., Schroeder M., (1987) Authentication revisited, Operating Systems Review, Vol. 21, No I, pp. 7.
Nesset D., (1990) A Critique of the BAN Logic, ACM Operating Systems Review, Vol. 24, No. 2, pp. 35–38.
Neuman B., Stubblebine S., (1993) A Note on the Use of Timestamps as Nonces, ACM Operating Systems Review, 27(2), pp. 10–14.
Oorschot van P. C., (1993) Extending Cryptographic Logics of Belief to Key Agreement Protocols, Proceeedings of the First ACM Conference on Computer and Communications Security, pp. 232–243.
Otway D., Rees O., (1987) Efficient and timely mutual authentication, ACM Operating Systems Review, 21(1), pp. 8–10.
Pal G. (1996) Verification of the iKP family of secure electronic payment protocols, http://Aveb.mit.edu/gnpal/www/ikplverifyikp.html.
Roscoe, A.W., (1993) Developing and verifying protocols in CSP, Proceedings of Mierlo workshop on protocols, TU Eidhoven.
Roscoe, A.W., (1995) Modelling and verifying key-exchange protocols using CSP & FDR, Proceedings of the 1995 IEEE Computer Security Foundations Workshop IIX, pp. 98–107, IEEE Computer Society Press.
Satyanarayanan M., (1989) Integrating Security in a large distributed system, ACM Transactions on Computer Systems, 7(3), pp. 247–280.
Scheid J., Holtsberg S., (1988) Ina Jo Specification Language Reference Manual, System Development Group, Unisys Corporation, CA.
Schlichting R. D., Schneider F. B., (1983) Fail-Stop Processors: An Approach to Designing Fault-Tolerant Computing Systems, ACM Transactions on Computing Systems, Vol. 2, No. 2, pp. 222–238.
Shieh, S.P., Yang, W.H., (1996) An Authentication and Key Distribution System for Open Network Systems, ACM Operating Systems Review, Vol. 30, No. 2, pp. 32–41.
Sidhu D., (1986) Authentication Protocols for Computer Networks, Computer Networks and ISDN Systems, 11, pp. 297–310.
Simmons G. (1985) How to Selectively Broadcast a Secret, Proceedings of the 1985 IEEE Symposium on Security and Privacy, IEEE Computer Society Press.
Stubblebine S., Gligor V., (1992) On Message Integrity in Cryptographic Protocols, Proceedings of the 1992 IEEE Symposium on Security and Privacy, pp. 85–104, IEEE Computer Society Press.
Snekkenes E., (1991) Exploring the BAN approach to Protocol Analysis, Proceedings of the IEEE Computer Security Foundations Workshop IV, pp. 171–181, IEEE CS Press.
Snekkenes E., (1995) Formal Specification and Analysis of Cryptographic Protocols, Ph.D. Thesis, University of Oslo, Norway.
Syverson P., (1991) The Use of Logic in the Analysis of Cryptographic Protocols, Proceedings of the 1991 IEEE Computer Security Symposium on Security and Privacy, pp. 156–170, IEEE Computer Society Press.
Syverson P., (1993) On Key Distribution Protocols for Repeated Authentication, ACM Operating Systems Review, 27(4), pp. 24–30.
Syverson P., (1996) Limitations on Design Principles for Public Key Protocols, Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 62–72, IEEE Computer Society Press.
Syverson P., Meadows C., (1993) A Logical Language for Specifying Cryptographic Protocol Requirements, Proceedings of the 1993 IEEE Computer Security Symposium on Security and Privacy, pp. 165–177, IEEE Computer Society Press.
Syverson P., P.C. van Oorschot (1994) On Unifying some Cryptographic Protocol Logics, Proceedings of the 1994 IEEE Computer Security Foundations Workshop VII, pp. 14–29, IEEE Computer Society Press.
Varadharajan V., (1989) Verification of Network Security Protocols, Computers and Security, Vol. 8, pp. 693–708.
Wedel G., Kessler V., (1996) Formal Semantics for Authentication Logics, ESORICS ′96 Proceedings of the Fourth European Symposium on Research in Computer Security, Springer Verlag, pp. 219–241.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1997 IFIP
About this chapter
Cite this chapter
Gritzalis, S., Nikitakos, N., Georgiadis, P. (1997). Formal methods for the Analysis and Design of Cryptographic Protocols: A state-of-the-art review. In: Katsikas, S. (eds) Communications and Multimedia Security. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35256-5_9
Download citation
DOI: https://doi.org/10.1007/978-0-387-35256-5_9
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2918-3
Online ISBN: 978-0-387-35256-5
eBook Packages: Springer Book Archive