Rewriting for cryptographic protocol verification

被引:0
|
作者
Genet, T
Klay, F
机构
[1] Univ Rennes 1, INRA, F-35042 Rennes, France
[2] France Telecom, F-22307 Lannion, France
来源
AUTOMATED DEDUCTION - CADE-17 | 2000年 / 1831卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
On a case study, we present a new approach for verifying cryptographic protocols, based on rewriting and on tree automata techniques. Protocols are operationally described using Term Rewriting Systems and the initial set of communication requests is described by a tree automaton. Starting from these two representations, we automatically compute an over-approximation of the set of exchanged messages (also recognized by a tree automaton). Then, proving classical properties like confidentiality or authentication can be done by automatically showing that the intersection between the approximation and a set of prohibited behaviors is the empty set. Furthermore, this method enjoys a simple and powerful way to describe intruder work, the ability to consider an unbounded number of parties, an unbounded number of interleaved sessions, and a theoretical property ensuring safeness of the approximation.
引用
收藏
页码:271 / 290
页数:20
相关论文
共 50 条
  • [1] Automated Verification Of Cryptographic Protocol Implementations
    Babenko, Liudmila
    Pisarev, Ilya
    12TH INTERNATIONAL CONFERENCE ON THE DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2019), 2019, : 849 - 854
  • [2] Advanced method for cryptographic protocol verification
    El Kadhi, Nabil
    El-Gendy, Hazem
    JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2006, 6 (5-6) : S109 - S119
  • [3] Towards a mechanization of cryptographic protocol verification
    Bolignano, D
    COMPUTER AIDED VERIFICATION, 1997, 1254 : 131 - 142
  • [4] Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
    Bhargavan, Karthikeyan
    Corin, Ricardo
    Denielou, Pierre-Malo
    Fournet, Cedric
    Leifer, James J.
    PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, 2009, : 124 - +
  • [5] Security verification of real-time cryptographic protocols using a rewriting approach
    Nara Inst of Science and Technology, Ikoma-shi, Japan
    IEICE Trans Inf Syst, 4 (355-363):
  • [6] Security verification of real-time cryptographic protocols using a rewriting approach
    Tanaka, T
    Kaji, Y
    Watanabe, H
    Takata, T
    Kasami, T
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 1998, E81D (04) : 355 - 363
  • [7] A method for automatic cryptographic protocol verification (extended abstract)
    Goubault-Larrecq, J
    PARALLEL AND DISTRIBUTED PROCESSING, PROCEEDINGS, 2000, 1800 : 977 - 984
  • [8] USING DEDUCTIVE KNOWLEDGE TO IMPROVE CRYPTOGRAPHIC PROTOCOL VERIFICATION
    Li, Zhiwei
    Wang, Weichao
    MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 635 - 641
  • [9] Modeling for security verification of a cryptographic protocol with MAC payload
    Wang, HB
    Zhang, YS
    Li, Y
    ADVANCES IN INTELLIGENT COMPUTING, PT 2, PROCEEDINGS, 2005, 3645 : 538 - 547
  • [10] Formal Verification of Cryptographic Protocol for Secure RFID System
    Kim, Hyun-Seok
    Oh, Jung-Hyun
    Kim, Ju-Bae
    Jeong, Yeon-Oh
    Choi, Jin-Young
    NCM 2008: 4TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, VOL 2, PROCEEDINGS, 2008, : 470 - 477