Authentication tests and the structure of bundles

被引:107
作者
Guttman, JD [1 ]
Thayer, FJ [1 ]
机构
[1] Mitre Corp, Bedford, MA 01730 USA
关键词
cryptographic protocols; authentication; secrecy; strand spaces; bundles; cryptographic protocol design;
D O I
10.1016/S0304-3975(01)00139-6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Suppose a principal in a cryptographic protocol creates and transmits a message containing a new value v, later receiving v back in a different cryptographic context. It can be concluded that some principal possessing the relevant key has received and transformed the message in which v was emitted. In some circumstances, this principal must be a regular participant of the protocol, not the penetrator. An inference of this kind is an authentication test. We introduce two main kinds of authentication test. An outgoing test is one in which the new value v is transmitted in encrypted form, and only a regular participant can extract it from that form. An incoming test is one in which v is received back in encrypted form, and only a regular participant can put it in that form. We combine these two tests with a supplementary idea, the unsolicited test, and a related method for checking that keys remain secret, Together these techniques determine what authentication properties are achieved by a wide range of cryptographic protocols. In this paper we introduce authentication tests and prove their soundness. We illustrate their power by giving new and straightforward proofs of security goals for several protocols. We also illustrate how to use the authentication tests as a heuristic for finding attacks against incorrect protocols. Finally, we suggest a protocol design process. We express these ideas in the strand space formalism (Thayer et al. J. Comput. Security 7 (1999) 191-230), which provides a convenient context to prove them correct. (C) 2002 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:333 / 380
页数:48
相关论文
共 29 条
[1]  
[Anonymous], 1997, A survey of authentication protocol literature: Version 1.0
[2]  
[Anonymous], 1996, LNCS
[3]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[4]  
Carlsen U., 1994, Operating Systems Review, V28, P16, DOI 10.1145/182110.182112
[5]  
CERVESATO I, 1999, P 12 IEEE COMP SEC F
[6]  
CLARKE EM, 1998, P IFIP WORK C PROGR
[7]  
DIERKS T, 1999, TLS PROTOCOL RFC 224
[8]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[9]   CVS: a compiler for the analysis of cryptographic protocols [J].
Durante, A ;
Focardi, R ;
Gorrieri, R .
PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, :203-212
[10]  
Fabrega F. J. T., 1999, Journal of Computer Security, V7, P191