A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties

被引:69
作者
Escobar, Santiago [1 ]
Meadows, Catherine
Meseguer, Jose
机构
[1] Univ Politecn Valencia, E-46071 Valencia, Spain
[2] Naval Res Lab, Washington, DC USA
[3] Univ Illinois, Urbana, IL 61801 USA
关键词
D O I
10.1016/j.tcs.2006.08.035
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The NRL Protocol Analyzer (NPA) is a tool for the formal specification and analysis of cryptographic protocols that has been used with great effect on a number of complex real-life protocols. One of the most interesting of its features is that it can be used to reason about security in face of attempted attacks on low-level algebraic properties of the functions used in a protocol. Indeed, it has been used successfully to either reproduce or discover a number of such attacks. In this paper we give for the first time a precise formal specification of the main features of the NPA inference system: its grammar-based techniques for invariant generation and its backwards reachability analysis method. This formal specification is given within the well-known rewriting framework so that the inference system is specified as a set of rewrite rules modulo an equational theory describing the behavior of the cryptographic algorithms involved. We then use this formalization to prove some important meta-logical properties about the NPA inference system, including the soundness and completeness of the search algorithm and soundness of the grammar generation algorithm. The formalization and soundness and completeness theorems not only provide also a better understanding of the NPA as it currently operates, but provide a modular basis which can be used as a starting point for increasing the types of equational theories it can handle. (c) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:162 / 202
页数:41
相关论文
共 33 条
[1]  
[Anonymous], LNCS
[2]  
[Anonymous], 1996, LNCS
[3]  
Baader F., 2001, HandBook of Automated Reasoning, V2, P445, DOI DOI 10.1016/B978-044450813-3/50010-2
[4]  
BASIN D, 2001, INT J INF SECUR, V4, P181
[5]   Relating multiset rewriting and process algebras for security protocol analysis [J].
Bistarelli, Stefano ;
Cervesato, Iliano ;
Lenzini, Gabriele ;
Martinelli, Fabio .
JOURNAL OF COMPUTER SECURITY, 2005, 13 (01) :3-47
[6]   An efficient cryptographic protocol verifier based on prolog rules [J].
Blanchet, B .
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, :82-96
[7]  
Chevalier Y, 2003, LECT NOTES COMPUT SC, V2914, P124
[8]  
CHEVALIER Y, 2003, 18 ANN IEEE S LOG CO
[9]   Maude:: Specification and programming in rewriting logic [J].
Clavel, M ;
Durán, F ;
Eker, S ;
Lincoln, P ;
Martí-Oliet, N ;
Meseguer, J ;
Quesada, JF .
THEORETICAL COMPUTER SCIENCE, 2002, 285 (02) :187-243
[10]   Intruder deductions, constraint solving and insecurity decision in presence of exclusive or [J].
Comon-Lundh, H ;
Shmatikov, V .
18TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2003, :271-280