Soft constraint programming to analysing security protocols

被引:11
|
作者
Bella, G
Bistarelli, S
机构
[1] Univ Catania, Dipartimento Matemat & Informat, I-95125 Catania, Italy
[2] CNR, Ist Informat & Telemat, I-56124 Pisa, Italy
[3] Univ G DAnnunzio, Dipartimento Sci, I-65127 Pescara, Italy
关键词
security; constraints; security protocols; soft constraints;
D O I
10.1017/S1471068404002121
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security protocols stipulate how the remote principals of a computer network should interact in order to obtain specific security goals. The crucial goals of confidentiality and authentication may be achieved in various forms, each of different strength. Using soft (rather than crisp) constraints, we develop a uniform formal notion for the two goals. They are no longer formalised as mere yes/no properties as in the existing literature, but gain an extra parameter, the security level. For example, different messages can enjoy different levels of confidentiality, or a principal can achieve different levels of authentication with different principals. The goals are formalised within a general framework for protocol analysis that is amenable to mechanisation by model checking. Following the application of the framework to analysing the asymmetric Needham-Schroeder protocol (Bella and Bistarelli 2001; Bella and Bistarelli 2002), we have recently discovered a new attack on that protocol as a form of retaliation by principals who have been attacked previously. Having commented on that attack, we then demonstrate the framework on a bigger, largely deployed protocol consisting of three phases, Kerberos.
引用
收藏
页码:545 / 572
页数:28
相关论文
共 50 条
  • [21] Timed analysis of security protocols
    Corin, R.
    Etalle, S.
    Hartel, P.
    Mader, A.
    JOURNAL OF COMPUTER SECURITY, 2007, 15 (06) : 619 - 645
  • [22] Verifying security protocols with Brutus
    Clarke, EM
    Jha, S
    Marrero, W
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2000, 9 (04) : 443 - 487
  • [23] Automated design of security protocols
    Hao, C
    Clark, JA
    Jacob, JL
    COMPUTATIONAL INTELLIGENCE, 2004, 20 (03) : 503 - 516
  • [24] Secrecy correctness for security protocols
    Adi, K
    Pene, L
    DFMA '05: FIRST INTERNATIONAL CONFERENCE ON DISTRIBUTED FRAMEWORKS FOR MULTIMEDIA APPLICATIONS, PROCEEDINGS, 2004, : 22 - 29
  • [25] Safely composing security protocols
    Véronique Cortier
    Stéphanie Delaune
    Formal Methods in System Design, 2009, 34 : 1 - 36
  • [26] Semiring-based Constraint Logic Programming: Syntax and semantics
    Bistarelli, S
    Montanari, U
    Rossi, F
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2001, 23 (01): : 1 - 29
  • [27] Safely composing security protocols
    Cortier, Veronique
    Delaune, Stephanie
    FORMAL METHODS IN SYSTEM DESIGN, 2009, 34 (01) : 1 - 36
  • [28] Developing Security Protocols by Refinement
    Sprenger, Christoph
    Basin, David
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 361 - 374
  • [29] Sessions and Separability in Security Protocols
    Carbone, Marco
    Guttman, Joshua D.
    PRINCIPLES OF SECURITY AND TRUST, POST 2013, 2013, 7796 : 267 - 286
  • [30] Timed Analysis of Security Protocols
    Szymoniak, Sabina
    Siedlecka-Lamch, Olga
    Kurkowski, Miroslaw
    INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY - ISAT 2016 - PT II, 2017, 522 : 53 - 63