Abstract
This paper presents an approximation function developed for the verification of cryptographic protocols. The main properties of this approximation are that it can be build automatically and its computation is guaranteed to terminate unlike Genet and Klay’s algorithm. This approximation has been used for the verification of the Needham-Schroeder, Otway-Rees and Woo Lam protocols. To be more precise, the approximation allows us to check secrecy and authenticity properties of the protocols.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Aziz, B., Gray, D., Hamilton, G., Oehl, F., Power, J., Sinclair, D.: Implementing Protocol Verification for E-Commerce. In: Proceedings of the 2001 International Conference on Advances in Infrastructure for Electronic Business, Science, and Education on the Internet, SSGRR 2001 (2001), http://student.dcu.ie/~oehlf2/
Abadi, M., Needham, R.: Prudent Engineering Practice for Cryptographic Protocols. IEEE Transactions on Software Engineering 22(1), 6–15 (1996)
Abadi, M., Tuttle, M.: A Semantics for a Logic of Authentication. In: Proceedings of the Tenth Annual ACM Symposium on Principles of Distributed Computing, pp. 201–216 (1991)
Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. Technical report, DIGITAL, Systems Research Center, N 39 (February 1989), http://www.research.digital.com/SRC/publications/
Bolignano, D.: Vérification formelle de protocoles cryptographiques á l’aide de Coq (1995)
Bolignano, D.: An Approach to the Formal Verification of Cryptographic Protocols. In: ACM Conference on Computer and Communications Security, pp. 106–118 (1996)
Bouajjani, A., Touili, T.: Extrapolating Tree Transformations. In: Brinksma, E., Larsen, K.G. (eds.) CAV 2002. LNCS, vol. 2404, p. 539. Springer, Heidelberg (2002), http://verif.liafa.jussieu.fr/~touili/
Clark, J., Jacob, J.: A Survey of Authentication Protocol literature: Version 1.0 (1997)
Denning, D.E., Sacco, G.M.: Timestamps in key distribution protocols. Communications of the ACM 24(8), 533–536 (1981)
Dolev, D., Yao, A.: On the security of public-key protocols. IEEE Transactions on Information Theory 2(29) (1983)
Genet, T.: Decidable Approximations of Sets of Descendants and Sets of Normal Forms. In: Nipkow, T. (ed.) RTA 1998. LNCS, vol. 1379, pp. 151–165. Springer, Heidelberg (1998)
Genet, T., Klay, F.: Rewriting for Cryptographic Protocol Verification. In: McAllester, D. (ed.) CADE 2000. LNCS, vol. 1831. Springer, Heidelberg (2000), http://citeseer.nj.nec.com/genet99rewriting.html
Goubault-Larrecq, J.: A method for automatic cryptographic protocol verification (extended abstract). In: Rolim, J.D.P. (ed.) FMPPTA 2000. LNCS, vol. 1800, pp. 977–984. Springer, Heidelberg (2000), http://www.dyade.fr/fr/actions/vip/publications.html
Gong, L., Needham, R., Yahalom, R.: Reasoning About Belief in Cryptographic Protocols. In: Cooper, D., Lunt, T. (eds.) Proceedings 1990 IEEE Symposium on Research in Security and Privacy, pp. 234–248. IEEE Computer Society, Los Alamitos (1990)
SET Working Group. SETTM Specification, books 1,2 and 3 (1996), http://www.setco.org/set_specifications.html
TLS Working Group. The TLS Protocol Version 1.0 (1996), http://www.ietf.org/html.charters/tls-charter.html
Gritzalis, S., Spinellis, D., Georgiadis, P.: Security Protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification. Computer Communications 22(8), 695–707 (1999), http://citeseer.nj.nec.com/gritzalis99security.html
Genet, T., Tong, V.V.T.: Reachability Analysis of Term Rewriting Systems with Timbuk. In: Nieuwenhuis, R., Voronkov, A. (eds.) LPAR 2001. LNCS (LNAI), vol. 2250, p. 695. Springer, Heidelberg (2001)
Jacquemard, F., Rusinowitch, M., Vigneron, L.: Compiling and Verifying Security Protocols. Logic Programming and Automated Reasoning, 131–160 (2000)
Leroy, X., Doligez, D., Garrigue, J., Rémy, D., Vouillon, J.: The Objective Caml system release 3.02 (2001)
Lowe, G.: An Attack on the Needham-Schroeder Public-Key Authentication Protocol. Information Processing Letters 56(3), 131–133 (1995)
Meadows, C.: A Model of Computation for the NRL Protocol Analyzer. In: CSFW (1994)
Meadows, C.: The NRL protocol analyser: An overview. Journal of Logic Programming 26(2), 113–131 (1996)
Monniaux, D.: Abstracting Cryptographic Protocols with Tree Automata. In: Cortesi, A., Filé, G. (eds.) SAS 1999. LNCS, vol. 1694, pp. 149–163. Springer, Heidelberg (1999), http://citeseer.nj.nec.com/monniaux99abstracting.html
Needham, R., Schroeder, M.: Using encryption for authentication in large networks of computers. Communications of the ACM 21(2), 120–126 (1978)
Oehl, F., Sinclair, D.: Combining two approaches for the verification of cryptographic protocols. In: Workshop Specification, Analysis and Validation for Emerging Technologies in Computational Logic, SAVE 2001 (2001), http://student.dcu.ie/~oehlf2/
Oehl, F., Sinclair, D.: Combining ISABELLE and Timbuk for Cryptographic Protocol Verification. In: Workshop Sécurité des Communications sur Internet, SECI 2002 (2002), http://student.dcu.ie/~oehlf2/
Paulson, L.C.: The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security 6 (1998), http://www.cl.cam.ac.uk/users/lcp/papers/protocols.html
Rémy, D., Vouillon, J.: Objective ML: An effective object-oriented extension to ML (1998)
Woo, T.Y.C., Lam, S.S.: A Lesson on Authentication Protocol Design. Operating Systems Review 28(3), 24–37 (1994)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Oehl, F., Cece, G., Kouchnarenko, O., Sinclair, D. (2003). Automatic Approximation for the Verification of Cryptographic Protocols. In: Abdallah, A.E., Ryan, P., Schneider, S. (eds) Formal Aspects of Security. FASec 2002. Lecture Notes in Computer Science, vol 2629. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-40981-6_5
Download citation
DOI: https://doi.org/10.1007/978-3-540-40981-6_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20693-4
Online ISBN: 978-3-540-40981-6
eBook Packages: Springer Book Archive