A Short Introduction to Two Approaches in Formal Verification of Security Protocols: Model Checking and Theorem Proving

被引:0
作者
Pourpouneh, Mohsen [1 ]
Ramezanian, Rasoul [2 ]
机构
[1] Sharif Univ Thechnol, Math Sience Dept, Tehran, Iran
[2] Ferdowsi Univ Mashhad, Math Sience Dept, Mashhad, Iran
来源
ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY | 2016年 / 8卷 / 01期
关键词
Cryptographic Protocols; Formal Verification; Model Checking; Theorem Proving;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as an example of this approach and then we model and verify some famous security protocols using Scyther. Theorem proving is based on deriving the desired goals from assumption of protocols via a deduction system. We define a deduction system named Simple Logic for Authentication to formally define the notion of authenticated communication based on the structure of the messages, and then we investigate several famous protocols using our proposed deduction system and compare it with the verification results of Scyther model checking. (C) 2016 ISC. All rights reserved.
引用
收藏
页码:3 / 24
页数:22
相关论文
共 49 条
  • [1] Abadi M., 1991, Proceedings of the Tenth Annual ACM Symposium on Principles of Distributed Computing, P201, DOI 10.1145/112600.112618
  • [2] Alves-Foss Jim, 1999, P 22 NATL INF SYST S, P44
  • [3] [Anonymous], SCYTHER SEMANTICS VE
  • [4] [Anonymous], 1988, RECOMMENDATION X CCI
  • [5] Aura T., 1997, LECT NOTES COMPUTER, V1334, P87, DOI DOI 10.1007/BFB0028465
  • [6] Bellare M., 1994, PROC CRYPTO, V773, P232, DOI [DOI 10.1007/3-540-48329-2_21, 10.1007/3-540- 48329-2]
  • [7] SYSTEMATIC DESIGN OF A FAMILY OF ATTACK-RESISTANT AUTHENTICATION PROTOCOLS
    BIRD, R
    GOPAL, I
    HERZBERG, A
    JANSON, PA
    KUTTEN, S
    MOLVA, R
    YUNG, M
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1993, 11 (05) : 679 - 693
  • [8] Boyd C., 2013, PROTOCOLS AUTHENTICA
  • [9] Burmester M., 1994, Advances in Cryptology - CRYPTO '94. 14th Annual International Cryptology Conference. Proceedings, P308
  • [10] Logic of authentication
    Burrows, Michael
    Abadi, Martin
    Needham, Roger
    [J]. Operating Systems Review (ACM), 1989, 23 (05): : 1 - 13