Reconstruction of attacks against cryptographic protocols

被引:22
作者
Allamigeon, X [1 ]
Blanchet, B [1 ]
机构
[1] Ecole Polytech, F-75230 Paris, France
来源
18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS | 2005年
关键词
D O I
10.1109/CSFW.2005.25
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study an automatic technique for the verification of cryptographic protocols based on a Horn clause model of the protocol. This technique yields proofs valid for an unbounded number of sessions of the protocol. However, up to now, it gave no definite information when the proof failed. In this paper we present an algorithm for reconstructing an attack against the protocol when the desired security property does not hold. We have proved soundness, termination, as well as a partial completeness result for our algorithm. We have also implemented it in the automatic protocol verifier ProVerif As an extreme example, we could reconstruct an attack involving 200 parallel sessions against the f(200) g(200) protocol [21].
引用
收藏
页码:140 / 154
页数:15
相关论文
共 27 条
[1]   Analyzing security protocols with secrecy types and logic programs [J].
Abadi, M ;
Blanchet, B .
JOURNAL OF THE ACM, 2005, 52 (01) :102-146
[2]   Secrecy types for asymmetric communication [J].
Abadi, M ;
Blanchet, B .
THEORETICAL COMPUTER SCIENCE, 2003, 298 (03) :387-415
[3]  
Abadi M, 2003, LECT NOTES COMPUT SC, V2694, P316
[4]  
ABADI M, 2002, 29 ACM S PRINC PROGR, P33
[5]  
ABADI M, 2001, 28 ACM S PRINC PROGR, P104
[6]  
ABADI M, 1999, NATO SCI SERIES, P39
[7]  
Aiello W., 2004, ACM Transactions on Information and Systems Security, V7, P242, DOI 10.1145/996943.996946
[8]  
[Anonymous], WORKSH FORM METH SEC
[9]  
[Anonymous], 1996, LNCS
[10]  
Bhargavan K, 2003, LECT NOTES COMPUT SC, V3188, P197