Rewriting for cryptographic protocol verification

被引:0
|
作者
Genet, T
Klay, F
机构
[1] Univ Rennes 1, INRA, F-35042 Rennes, France
[2] France Telecom, F-22307 Lannion, France
来源
AUTOMATED DEDUCTION - CADE-17 | 2000年 / 1831卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
On a case study, we present a new approach for verifying cryptographic protocols, based on rewriting and on tree automata techniques. Protocols are operationally described using Term Rewriting Systems and the initial set of communication requests is described by a tree automaton. Starting from these two representations, we automatically compute an over-approximation of the set of exchanged messages (also recognized by a tree automaton). Then, proving classical properties like confidentiality or authentication can be done by automatically showing that the intersection between the approximation and a set of prohibited behaviors is the empty set. Furthermore, this method enjoys a simple and powerful way to describe intruder work, the ability to consider an unbounded number of parties, an unbounded number of interleaved sessions, and a theoretical property ensuring safeness of the approximation.
引用
收藏
页码:271 / 290
页数:20
相关论文
共 50 条
  • [21] Compositional Verification in Rewriting Logic
    Martin, Oscar
    Verdejo, Alberto
    Marti-Oliet, Narciso
    THEORY AND PRACTICE OF LOGIC PROGRAMMING, 2024, 24 (01) : 57 - 109
  • [22] Permutation rewriting and algorithmic verification
    Bouajjani, Ahmed
    Muscholl, Anca
    Touili, Tayssir
    INFORMATION AND COMPUTATION, 2007, 205 (02) : 199 - 224
  • [23] A verification logic for rewriting logic
    Martí-Oliet, N
    Pita, I
    Fiadeiro, JL
    Meseguer, J
    Maibaum, T
    JOURNAL OF LOGIC AND COMPUTATION, 2005, 15 (03) : 317 - 352
  • [24] Permutation rewriting and algorithmic verification
    Bouajjani, A
    Muscholl, A
    Touili, T
    16TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2001, : 399 - 408
  • [25] Verification of stateful cryptographic protocols with exclusive OR
    Dreier, Jannik
    Hirschi, Lucca
    Radomirovic, Sasa
    Sasse, Ralf
    JOURNAL OF COMPUTER SECURITY, 2020, 28 (01) : 1 - 34
  • [26] Automated verification tools for cryptographic protocols
    Hassan, Adel
    Ishaq, Isam
    Minilla, Jorge
    2021 INTERNATIONAL CONFERENCE ON PROMISING ELECTRONIC TECHNOLOGIES (ICPET 2021), 2021, : 58 - 65
  • [27] Cryptographic protocol for payment transaction
    Cheng, CY
    Seman, K
    Yunus, J
    IEEE 2000 TENCON PROCEEDINGS, VOLS I-III: INTELLIGENT SYSTEMS AND TECHNOLOGIES FOR THE NEW MILLENNIUM, 2000, : B1 - B5
  • [28] Method of formal verification of cryptographic circuits
    Toshiba Research and Development, Cent, Kawasaki, Japan
    J Electron Test Theory Appl JETTA, 3 (321-322):
  • [29] Automatic approximation for the verification of cryptographic protocols
    Oehl, F
    Cece, G
    Kouchnarenko, O
    Sinclair, D
    FORMAL ASPECTS OF SECURITY, 2003, 2629 : 33 - 48
  • [30] SEVERAL CRYPTOGRAPHIC APPLICATIONS OF ∑-PROTOCOL
    Chunming TANG Zheng-an YAO School of Mathematics and Information Science
    State Key Laboratory.of Information Security
    Journal of Systems Science & Complexity, 2009, 22 (02) : 260 - 279