Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties

被引:134
|
作者
Schmidt, Benedikt [1 ]
Meier, Simon [1 ]
Cremers, Cas [1 ]
Basin, David [1 ]
机构
[1] ETH, Inst Informat Secur, Zurich, Switzerland
来源
2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF) | 2012年
关键词
KEY; VERIFICATION; PRODUCTS;
D O I
10.1109/CSF.2012.25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a general approach for the symbolic analysis of security protocols that use Diffie-Hellman exponentiation to achieve advanced security properties. We model protocols as multiset rewriting systems and security properties as first-order formulas. We analyze them using a novel constraint-solving algorithm that supports both falsification and verification, even in the presence of an unbounded number of protocol sessions. The algorithm exploits the finite variant property and builds on ideas from strand spaces and proof normal forms. We demonstrate the scope and the effectiveness of our algorithm on non-trivial case studies. For example, the algorithm successfully verifies the NAXOS protocol with respect to a symbolic version of the eCK security model.
引用
收藏
页码:78 / 94
页数:17
相关论文
共 25 条
  • [1] Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation
    Kuesters, Ralf
    Truderung, Tomasz
    PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, 2009, : 157 - 171
  • [2] Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption
    Chevalier, Yannick
    Kuesters, Ralf
    Rusinowitch, Michael
    Turuani, Mathieu
    ACM TRANSACTIONS ON COMPUTATIONAL LOGIC, 2008, 9 (04)
  • [3] Automated Analysis of Equivalence Properties for Security Protocols Using Else Branches
    Gazeau, Ivan
    Kremer, Steve
    COMPUTER SECURITY - ESORICS 2017, PT II, 2017, 10493 : 1 - 20
  • [4] A Secure Wireless Communication. System Integrating PRNG and Diffie-Hellman PKDS by Using a Data Connection Core
    You, Ilsun
    Huang, Yi-Li
    Leu, Fang-Yie
    Liu, Jung-Chun
    Lo, Lih-Jiun
    JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (05): : 713 - 726
  • [5] Abstraction and resolution modulo AC: How to verify Diffie-Hellman-like protocols automatically
    Goubault-Larrecq, J
    Roger, M
    Verma, KN
    JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2005, 64 (02): : 219 - 251
  • [6] POSTER: Towards Precise and Automated Verification of Security Protocols in Coq
    Palombo, Hernan M.
    Zheng, Hao
    Ligatti, Jay
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 2567 - 2569
  • [7] Automated Verification of Equivalence Properties of Cryptographic Protocols
    Chadha, Rohit
    Cheval, Vincent
    Ciobaca, Stefan
    Kremer, Steve
    ACM TRANSACTIONS ON COMPUTATIONAL LOGIC, 2016, 17 (04)
  • [8] Bounding messages for free in security protocols - extension to various security properties
    Arapinis, Myrto
    Duflot, Marie
    INFORMATION AND COMPUTATION, 2014, 239 : 182 - 215
  • [9] Formal Reasoning about Physical Properties of Security Protocols
    Basin, David
    Capkun, Srdjan
    Schaller, Patrick
    Schmidt, Benedikt
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (02)
  • [10] Observational equivalence and security games: Enhancing the formal analysis of security protocols
    Cai, Liujia
    Cai, Guangying
    Lu, Siqi
    Li, Guangsong
    Wang, Yongjuan
    COMPUTERS & SECURITY, 2024, 140