Pitfalls in Formal Reasoning about Security Protocols

被引:2
|
作者
Moebius, Nina [1 ]
Stenzel, Kurt [1 ]
Reif, Wolfgang [1 ]
机构
[1] Univ Augsburg, Inst Software & Syst Engn, D-8900 Augsburg, Germany
来源
FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS | 2010年
关键词
formal verification; security protocols;
D O I
10.1109/ARES.2010.36
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Formal verification can give more confidence in the security of cryptographic protocols. Application specific security properties like "The service provider does not loose money" can give even more confidence than standard properties like secrecy or authentication. However, it is surprisingly easy to get a meaningful property slightly wrong. The result is that an insecure protocol can be 'proven' secure. We illustrate the problem with a very small application, a copy card, that has only five different messages. The example is taken from a paper where the protocol is secure, but the proved property slightly wrong. We propose to solve the problem by incorporating more of the real-world application into the formal model.
引用
收藏
页码:248 / 253
页数:6
相关论文
共 50 条
  • [31] Refining security protocols
    Sprenger, Christoph
    Basin, David
    JOURNAL OF COMPUTER SECURITY, 2018, 26 (01) : 71 - 120
  • [32] Formal Methods for Connected Vehicle Protocols
    Stojanovic, Branka
    Hofer-Schmitz, Katharina
    2019 27TH TELECOMMUNICATIONS FORUM (TELFOR 2019), 2019, : 177 - 180
  • [33] THE FORMAL STUDY OF QUANTUM CRYPTOGRAPHY PROTOCOLS
    Yang, Fan
    Hao, Yu-Jie
    2013 10TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2013, : 29 - 33
  • [34] Reasoning about DNSSEC
    Babu, Kollapalli Ramesh
    Padmanabhan, Vineet
    Bhukya, Wilson Naik
    MULTI-DISCIPLINARY TRENDS IN ARTIFICIAL INTELLIGENCE, 2011, 7080 : 75 - 86
  • [36] ProToc-An Universal Language for Security Protocols Specifications
    Grosser, A.
    Kurkowski, M.
    Piatkowski, J.
    Szymoniak, S.
    SOFT COMPUTING IN COMPUTER AND INFORMATION SCIENCE, 2015, 342 : 237 - 248
  • [37] Formally sound implementations of security protocols with Java']JavaSPI
    Sisto, Riccardo
    Copet, Piergiuseppe Bettassa
    Avalle, Matteo
    Pironti, Alfredo
    FORMAL ASPECTS OF COMPUTING, 2018, 30 (02) : 279 - 317
  • [38] Timed analysis of security protocols
    Corin, R.
    Etalle, S.
    Hartel, P.
    Mader, A.
    JOURNAL OF COMPUTER SECURITY, 2007, 15 (06) : 619 - 645
  • [39] Automated design of security protocols
    Hao, C
    Clark, JA
    Jacob, JL
    COMPUTATIONAL INTELLIGENCE, 2004, 20 (03) : 503 - 516
  • [40] Secrecy correctness for security protocols
    Adi, K
    Pene, L
    DFMA '05: FIRST INTERNATIONAL CONFERENCE ON DISTRIBUTED FRAMEWORKS FOR MULTIMEDIA APPLICATIONS, PROCEEDINGS, 2004, : 22 - 29