Soft constraint programming to analysing security protocols

被引:11
|
作者
Bella, G
Bistarelli, S
机构
[1] Univ Catania, Dipartimento Matemat & Informat, I-95125 Catania, Italy
[2] CNR, Ist Informat & Telemat, I-56124 Pisa, Italy
[3] Univ G DAnnunzio, Dipartimento Sci, I-65127 Pescara, Italy
关键词
security; constraints; security protocols; soft constraints;
D O I
10.1017/S1471068404002121
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security protocols stipulate how the remote principals of a computer network should interact in order to obtain specific security goals. The crucial goals of confidentiality and authentication may be achieved in various forms, each of different strength. Using soft (rather than crisp) constraints, we develop a uniform formal notion for the two goals. They are no longer formalised as mere yes/no properties as in the existing literature, but gain an extra parameter, the security level. For example, different messages can enjoy different levels of confidentiality, or a principal can achieve different levels of authentication with different principals. The goals are formalised within a general framework for protocol analysis that is amenable to mechanisation by model checking. Following the application of the framework to analysing the asymmetric Needham-Schroeder protocol (Bella and Bistarelli 2001; Bella and Bistarelli 2002), we have recently discovered a new attack on that protocol as a form of retaliation by principals who have been attacked previously. Having commented on that attack, we then demonstrate the framework on a bigger, largely deployed protocol consisting of three phases, Kerberos.
引用
收藏
页码:545 / 572
页数:28
相关论文
共 50 条
  • [41] Modelling and analysing cognitive causes of security breaches
    Ruksenas, Rimvydas
    Curzon, Paul
    Blandford, Ann
    INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2008, 4 (02) : 143 - 160
  • [42] Analysing the Security of NFC Based Payment Systems
    Tabet, Nour Elhouda
    Ayu, Media Anugerah
    2016 INTERNATIONAL CONFERENCE ON INFORMATICS AND COMPUTING (ICIC), 2016, : 169 - 174
  • [43] Modelling and analysing cognitive causes of security breaches
    Rimvydas Rukšėnas
    Paul Curzon
    Ann Blandford
    Innovations in Systems and Software Engineering, 2008, 4 (2) : 143 - 160
  • [44] Automatic Verification of Simulatability in Security Protocols
    Araragi, Tadashi
    Pereira, Olivier
    FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 275 - +
  • [45] Formal automatic verification of security protocols
    Xiao, Meihua
    Xue, Jinyun
    2006 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, 2006, : 566 - +
  • [46] Synthesising Efficient and Effective Security Protocols
    Hao, Chen
    Clark, John A.
    Jacob, Jeremy L.
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 125 (01) : 25 - 41
  • [47] Automatic verification of correspondences for security protocols
    Blanchet, Bruno
    JOURNAL OF COMPUTER SECURITY, 2009, 17 (04) : 363 - 434
  • [48] Human competitive security protocols synthesis
    Chen, Hao
    Clark, John
    Jacob, Jeremy
    GECCO 2006: GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, VOL 1 AND 2, 2006, : 1855 - +
  • [49] Security considerations in current VOIP protocols
    Fries, Steffen
    SECRYPT 2006: Proceedings of the International Conference on Security and Cryptography, 2006, : 183 - 191
  • [50] Internet of Vehicles: Architecture, Protocols, and Security
    Contreras-Castillo, Juan
    Zeadally, Sherali
    Antonio Guerrero-Ibanez, Juan
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (05): : 3701 - 3709