Cryptographic protocol security analysis based on bounded constructing algorithm

被引:0
作者
Li, XX [1 ]
Huai, JP [1 ]
机构
[1] Beihang Univ, Sch Comp, Beijing 100083, Peoples R China
来源
SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES | 2006年 / 49卷 / 01期
基金
中国国家自然科学基金;
关键词
cryptographic protocol; formal analysis; security verification;
D O I
10.1007/s11432-004-0512-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.
引用
收藏
页码:26 / 47
页数:22
相关论文
共 14 条
[1]  
[Anonymous], 1996, LNCS
[2]  
BOREALE M, 2002, P 2002 ACM S APPL CO, P281
[3]   Verifying security protocols with Brutus [J].
Clarke, EM ;
Jha, S ;
Marrero, W .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2000, 9 (04) :443-487
[4]  
COMON H, 2002, J TELECOMMUNICATIONS, V4, P5
[5]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[6]  
DURGIN N, 1999, EL P WORKSH FORM MET
[7]   Algebra model and security analysis for cryptographic protocols [J].
Huai, JP ;
Li, XX .
SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02) :199-220
[8]  
HUIMA A, 1999, P FLOC WORKSH FORM M
[9]  
MEADOWS C, 1994, P 1994 COMP SEC FDN
[10]  
MILLEN JK, 1995, P IEEE S SECUR PRIV, P251, DOI 10.1109/SECPRI.1995.398937