A Framework for Formal Verification of Security Protocols in C plus

被引:1
作者
Pradeep, R. [1 ]
Sunitha, N. R. [1 ]
Ravi, V [1 ]
Verma, Sushma [2 ]
机构
[1] Siddaganga Inst Technol, Dept Comp Sci & Engn, Tumkur 572103, Karnataka, India
[2] Def Res & Dev Org, SAG, New Delhi, India
来源
INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019 | 2020年 / 89卷
关键词
Formal verification; Model checking; Internet Key Exchange (IKE); Scyther; Skeme; Oakley; CSP;
D O I
10.1007/978-981-15-0146-3_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Every communication system is a safety-critical system, in which the communicating entities share the confidential data over the untrusted public network by using a set of cryptographic security protocols (CSPs). Many security protocols proved secure were cracked within a short span of time, and the best example is Needham-Schroeder authentication protocol. The quality assurance about the correctness of security protocols is one of the key challenges. In software testing, it is not possible to prove the correctness of security protocols, because testing has got major drawbacks and the tester cannot predict what knowledge an attacker may gain about the communication system by interacting with several runs of the protocol, and also testing shows the presence of bugs but can never show the absence of bugs. Formal verification has proved to be a reliable solution as the correctness of the CSP can be proved mathematically. In the proposed work, a new framework is proposed, which includes a library of functions to specify a security protocol in C++ by following a set of rules (syntax and semantics), a interpreter to interpret the C++ code to security protocol description language (SPDL), and finally a model checker Scyther backend verification engine. The proposed framework is successful in identifying the attacks on IKE version-1. Also the Skeme and Oakley versions were verified for their correctness.
引用
收藏
页码:163 / 175
页数:13
相关论文
共 11 条
[1]  
[Anonymous], Florida's and Minnesota's operational protocols had not been approved as of April 2012
[2]  
Carrel D, 1998, RFC 2409 (Proposed Standard), DOI [10.17487/RFC2409, DOI 10.17487/RFC2409]
[3]  
Clarke E.M., 1987, P 6 ANN ACM S PRINCI, P294, DOI DOI 10.1145/41840.41865
[4]  
Cremers C.J.F., 2003, NVTI NEWSLETTER, V7, P21
[5]  
Gibson-Robinson T., 2014, Lecture Notes in Computer Science, V8413, P187, DOI DOI 10.1007/978-3-642
[6]   A computational interpretation of Dolev-Yao adversaries [J].
Herzog, J .
THEORETICAL COMPUTER SCIENCE, 2005, 340 (01) :57-81
[7]  
Holzmann G.J., 2003, The SPIN Model Checker: Primer and Reference Manual
[8]  
Krawczyk H., 1996, Proceedings of the Symposium on Network and Distributed System Security, P114, DOI 10.1109/NDSS.1996.492418
[9]  
Lowe G., 1996, Tools and Algorithms for the Construction and Analysis of Systems. Second International Workshop, TACAS '96. Proceedings, P147
[10]   USING ENCRYPTION FOR AUTHENTICATION IN LARGE NETWORKS OF COMPUTERS [J].
NEEDHAM, RM ;
SCHROEDER, MD .
COMMUNICATIONS OF THE ACM, 1978, 21 (12) :993-999