Automated verification of selected equivalences for security protocols

被引:131
作者
Blanchet, Bruno [1 ]
Abadi, Martin [2 ,3 ]
Fournet, Cedric [4 ]
机构
[1] CNRS, Ecole Normale Super, Paris, France
[2] Univ Calif Santa Cruz, Santa Cruz, CA 95064 USA
[3] Microsoft Res, Washington, DC USA
[4] Microsoft Res, Cambridge, England
来源
JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING | 2008年 / 75卷 / 01期
基金
美国国家科学基金会;
关键词
D O I
10.1016/j.jlap.2007.06.002
中图分类号
学科分类号
摘要
In the analysis of security protocols, methods and tools for reasoning about protocol behaviors have been quite effective. We aim to expand the scope of those methods and tools. We focus on proving equivalences P approximate to P, Q in which P and Q are two processes that differ only in the choice of some terms. These equivalences arise often in applications. We show how to treat them as predicates on the behaviors of a process that represents P and Q at the same time. We develop our techniques in the context of the applied pi calculus and implement them in the tool ProVerif. (c) 2007 Elsevier Inc. All rights reserved.
引用
收藏
页码:3 / 51
页数:49
相关论文
共 46 条
[1]   Analyzing security protocols with secrecy types and logic programs [J].
Abadi, M ;
Blanchet, B .
JOURNAL OF THE ACM, 2005, 52 (01) :102-146
[2]  
Abadi M, 2003, LECT NOTES COMPUT SC, V2896, P72
[3]   A calculus for cryptographic protocols: The spi calculus [J].
Abadi, M ;
Gordon, AD .
INFORMATION AND COMPUTATION, 1999, 148 (01) :1-70
[4]  
Abadi M., 1998, Nordic Journal of Computing, V5, P267
[5]   Secrecy by typing in security protocols [J].
Abadi, M .
JOURNAL OF THE ACM, 1999, 46 (05) :749-786
[6]  
ABADI M, 2001, 28 ANN ACM SIGPLAN S, V104
[7]   Just fast keying in the Pi calculus [J].
Abadi, Martin ;
Blanchet, Bruno ;
Fournet, Cedric .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2007, 10 (03)
[8]   Deciding knowledge in security protocols under equational theories [J].
Abadi, Martin ;
Cortier, Veronique .
THEORETICAL COMPUTER SCIENCE, 2006, 367 (1-2) :2-32
[9]  
Aiello W., 2004, ACM Transactions on Information and Systems Security, V7, P242, DOI 10.1145/996943.996946
[10]   Reconstruction of attacks against cryptographic protocols [J].
Allamigeon, X ;
Blanchet, B .
18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2005, :140-154