Soft constraint programming to analysing security protocols

被引:11
|
作者
Bella, G
Bistarelli, S
机构
[1] Univ Catania, Dipartimento Matemat & Informat, I-95125 Catania, Italy
[2] CNR, Ist Informat & Telemat, I-56124 Pisa, Italy
[3] Univ G DAnnunzio, Dipartimento Sci, I-65127 Pescara, Italy
关键词
security; constraints; security protocols; soft constraints;
D O I
10.1017/S1471068404002121
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security protocols stipulate how the remote principals of a computer network should interact in order to obtain specific security goals. The crucial goals of confidentiality and authentication may be achieved in various forms, each of different strength. Using soft (rather than crisp) constraints, we develop a uniform formal notion for the two goals. They are no longer formalised as mere yes/no properties as in the existing literature, but gain an extra parameter, the security level. For example, different messages can enjoy different levels of confidentiality, or a principal can achieve different levels of authentication with different principals. The goals are formalised within a general framework for protocol analysis that is amenable to mechanisation by model checking. Following the application of the framework to analysing the asymmetric Needham-Schroeder protocol (Bella and Bistarelli 2001; Bella and Bistarelli 2002), we have recently discovered a new attack on that protocol as a form of retaliation by principals who have been attacked previously. Having commented on that attack, we then demonstrate the framework on a bigger, largely deployed protocol consisting of three phases, Kerberos.
引用
收藏
页码:545 / 572
页数:28
相关论文
共 50 条
  • [31] DYNAMIC TAGS FOR SECURITY PROTOCOLS
    Arapinis, Myrto
    Delaune, Stephanie
    Kremer, Steve
    LOGICAL METHODS IN COMPUTER SCIENCE, 2014, 10 (02)
  • [32] Soft constraint automata with memory
    Dokter, Kasper
    Gadducci, Fabio
    Lion, Benjamin
    Santini, Francesco
    JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2021, 118
  • [33] The complexity of soft constraint satisfaction
    Cohen, David A.
    Cooper, Martin C.
    Jeavons, Peter G.
    Krokhin, Andrei A.
    ARTIFICIAL INTELLIGENCE, 2006, 170 (11) : 983 - 1016
  • [34] Programming Languages in Security
    Schneider, Fred B.
    ACM SIGPLAN NOTICES, 2013, 48 (06) : 139 - 139
  • [35] A study of the energy consumption characteristics of cryptographic algorithms and security protocols
    Potlapally, NR
    Ravi, S
    Raghunathan, A
    Jha, NK
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006, 5 (02) : 128 - 143
  • [36] Formalizing Security and Safety Requirements by Mapping Attack-Fault Trees on Obstacle Models with Constraint Programming Semantics
    Ponsard, Christophe
    Deprez, Jean-Christophe
    Darimont, Robert
    2020 IEEE WORKSHOP ON FORMAL REQUIREMENTS (FORMREQ 2020), 2020, : 8 - 13
  • [37] Constraint Programming 2000: A Position Paper
    Jaffar J.
    Yap R.H.C.
    Constraints, 1997, 2 (1) : 71 - 73
  • [38] Constraint logic programming - Status and prospects
    Wallace, M
    CRITICAL TECHNOLOGY: PROCEEDINGS OF THE THIRD WORLD CONGRESS ON EXPERT SYSTEMS, VOLS I AND II, 1996, : 13 - 23
  • [39] Constraint Functional Logic Programming Revisited
    Javier Lopez-Fraguas, F.
    Rodriguez-Artalejo, Mario
    del Vado Virseda, Rafael
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 117 : 5 - 50
  • [40] Analysing Requirements to Detect Latent Security Vulnerabilities
    Busby-Earle, Curtis C. R.
    France, Robert B.
    Ray, Indrakshi
    2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 168 - 175