Formal verification: an imperative step in the design of security protocols

被引:11
作者
Coffey, T [1 ]
Dojen, R [1 ]
Flanagan, T [1 ]
机构
[1] Univ Limerick, Dept Elect & Comp Engn, Data Commun Secur Lab, Limerick, Ireland
来源
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING | 2003年 / 43卷 / 05期
关键词
formal verification; security protocols; modal logics; cryptography; BCY protocol attack;
D O I
10.1016/S1389-1286(03)00292-5
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Traditionally, security protocols have been designed and verified using informal techniques. However, the absence of formal verification can lead to security errors remaining undetected. Formal verification techniques, on the other hand, provide a systematic way of discovering protocol flaws. This paper discusses the process of formal verification using modal logics. The verification process is demonstrated by way of case studies on three security protocols, which are designed for use in mobile communications. Our formal analysis discovers all known flaws in the three chosen protocols. Further, a hitherto unknown flaw is identified in these protocols. This flaw causes a protocol failure, which can be exploited in an attack where an adversary impersonates a legitimate protocol participant. A new protocol, resistant to this attack, is proposed and formally verified, giving confidence in the correctness of the protocol. The result of these case studies, where formal verification successfully discovers all these flaws, demonstrates that using formal verification techniques is an imperative step in the design of security protocols. (C) 2003 Elsevier B.V. All rights reserved.
引用
收藏
页码:601 / 618
页数:18
相关论文
共 21 条
  • [1] *3G TSPP, 33102 3G TSPP
  • [2] PRIVACY AND AUTHENTICATION ON A PORTABLE COMMUNICATIONS-SYSTEM
    BELLER, MJ
    CHANG, LF
    YACOBI, Y
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1993, 11 (06) : 821 - 829
  • [3] BOYD C, 1998, P 1998 INT C INF SEC
  • [4] BURROWS M, 1989, ACM OPERATING SYSTEM, V23, P1, DOI DOI 10.1145/74851.74852
  • [5] Carlsen U., 1994, Operating Systems Review, V28, P16, DOI 10.1145/182110.182112
  • [6] Logic for verifying public-key cryptographic protocols
    Coffey, T
    Saidha, P
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1997, 144 (01): : 28 - 32
  • [7] NEW DIRECTIONS IN CRYPTOGRAPHY
    DIFFIE, W
    HELLMAN, ME
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654
  • [8] Gligor V. D., 1991, Proceedings. The Computer Security Foundations Workshop IV (Cat. No.91TH0383-0), P219, DOI 10.1109/CSFW.1991.151591
  • [9] Gong L., 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P234, DOI 10.1109/RISP.1990.63854
  • [10] GONG L, 1991, P 4 IEEE COMP SEC FD, P99