Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties

被引:134
作者
Schmidt, Benedikt [1 ]
Meier, Simon [1 ]
Cremers, Cas [1 ]
Basin, David [1 ]
机构
[1] ETH, Inst Informat Secur, Zurich, Switzerland
来源
2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF) | 2012年
关键词
KEY; VERIFICATION; PRODUCTS;
D O I
10.1109/CSF.2012.25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a general approach for the symbolic analysis of security protocols that use Diffie-Hellman exponentiation to achieve advanced security properties. We model protocols as multiset rewriting systems and security properties as first-order formulas. We analyze them using a novel constraint-solving algorithm that supports both falsification and verification, even in the presence of an unbounded number of protocol sessions. The algorithm exploits the finite variant property and builds on ideas from strand spaces and proof normal forms. We demonstrate the scope and the effectiveness of our algorithm on non-trivial case studies. For example, the algorithm successfully verifies the NAXOS protocol with respect to a symbolic version of the eCK security model.
引用
收藏
页码:78 / 94
页数:17
相关论文
共 25 条
  • [21] Automated formal analysis of temporal properties of Ladder programs
    Lourenco, Claudio Belo
    Cousineau, Denis
    Faissole, Florian
    Marche, Claude
    Mentre, David
    Inoue, Hiroaki
    INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2022, 24 (06) : 977 - 997
  • [22] Automated Formal Analysis of NetConf Protocol for Authentication Properties
    Izadi, Farnaz
    Shahhoseini, Hadi Shahriar
    2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 1055 - 1059
  • [23] Constraint-driven nonlinear reachability analysis with automated tuning of tool properties
    Geretti, Luca
    Collins, Pieter
    Nuzzo, Pierluigi
    Villa, Tiziano
    NONLINEAR ANALYSIS-HYBRID SYSTEMS, 2024, 54
  • [24] Formal Analysis of Security Properties of Cyber-physical System Based on Timed Automata
    Wang, Ting
    Su, Qi
    Chen, Tieming
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 534 - 540
  • [25] Iterative Analysis to Improve Key Properties of Critical Human-Intensive Processes: An Election Security Example
    Osterweil, Leon J.
    Bishop, Matt
    Conboy, Heather M.
    Phan, Huong
    Simidchieva, Borislava I.
    Avrunin, George S.
    Clarke, Lori A.
    Peisert, Sean
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2017, 20 (02)