A computationally sound mechanized prover for security protocols

被引:105
作者
Blanchet, Bruno [1 ]
机构
[1] Ecole Normale Super, CNRS, Paris, France
来源
2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS | 2006年
关键词
D O I
10.1109/SP.2006.1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a new mechanized prover for secrecy properties of cryptographic protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the computational model. It produces proofs presented as sequences of games; these games are formalized in a probabilistic polynomial-time process calculus. Our tool provides a generic method for specifying security properties of the cryptographic primitives, which can handle shared and public-key encryption, signatures, message authentication codes, and hash functions. Our tool produces proofs valid for a number of sessions polynomial in the security parameter in the presence of an active adversary. We have implemented our tool and tested it on a number of examples of protocols from the literature.
引用
收藏
页码:140 / 154
页数:15
相关论文
共 46 条
[1]   Reconciling two views of cryptography (The computational soundness of formal encryption) [J].
Abadi, M ;
Rogaway, P .
JOURNAL OF CRYPTOLOGY, 2002, 15 (02) :103-127
[2]   Prudent engineering practice for cryptographic protocols [J].
Abadi, M ;
Needham, R .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1996, 22 (01) :6-15
[3]  
ABADI M, 2001, LNCS, V2215, P82
[4]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[5]  
Adao P, 2005, LECT NOTES COMPUT SC, V3679, P374
[6]  
[Anonymous], 1996, LNCS
[7]   Relating symbolic and cryptographic secrecy [J].
Backes, M ;
Pfitzmann, B .
2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2005, :171-182
[8]  
Backes M, 2003, LECT NOTES COMPUT SC, V2808, P271
[9]  
BACKES M, 2004, 17 IEEE COMP SEC FDN
[10]  
BACKES M, 2003, CCS 03 P 10 ACM C CO, P220, DOI DOI 10.1145/948109.948140