Tree Automata for Detecting Attacks on Protocols with Algebraic Cryptographic Primitives

被引:1
|
作者
Boichut, Yohan [1 ]
Heam, Pierre-Cyrille [2 ]
Kouchnarenko, Olga [3 ]
机构
[1] Univ Orleans, Lab Informat Fondamentale Orleans, Orleans, France
[2] ENS Cachan, CNRS, INRIA, LSV, Cachan, France
[3] CASSIS, INRIA, LIFC, Besancon, France
关键词
Security protocol; algebraic properties; automatic approximation;
D O I
10.1016/j.entcs.2009.05.030
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper extends a rewriting approximations-based theoretical framework in which the security problem - secrecy preservation against an active intruder - may be semi-decided through a reachability analysis. In a recent paper, we have shown how to semi-decide whether a security protocol using algebraic properties of cryptographic primitives is safe. In this paper, we investigate the dual - insecurity - problem: we explain how to semi-decide whether a protocol using cryptographic primitive algebraic properties is unsafe. This improvement offers us to draw automatically a complete diagnostic of a security protocol with an unbounded number of sessions. Furthermore, our approach is supported by the tool TA4SP successfully applied for analysing the NSPK-xor protocol and the Diffie-Hellman protocol.
引用
收藏
页码:57 / 72
页数:16
相关论文
共 50 条
  • [21] ASAP: Algorithm Substitution Attacks on Cryptographic Protocols
    Berndt, Sebastian
    Wichelmann, Jan
    Pott, Claudius
    Traving, Tim-Henrik
    Eisenbarth, Thomas
    ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 712 - 726
  • [22] Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks
    Papadimitriou, Anthonis
    Le Fessant, Fabrice
    Viana, Aline Carneiro
    Sengul, Cigdem
    2009 5TH IEEE WORKSHOP ON SECURE NETWORK PROTOCOLS, 2009, : 43 - +
  • [23] Automata-based analysis of recursive cryptographic protocols
    Küsters, R
    Wilke, T
    STACS 2004, PROCEEDINGS, 2004, 2996 : 382 - 393
  • [24] On Cryptographic Approaches for Detecting GNSS Spoofing Attacks
    Ramalingam, Jothi
    Maned, Veeresh R.
    2024 IEEE SPACE, AEROSPACE AND DEFENCE CONFERENCE, SPACE 2024, 2024, : 384 - 388
  • [25] Blockwise p-Tampering Attacks on Cryptographic Primitives, Extractors, and Learners
    Mahloujifar, Saeed
    Mahmoody, Mohammad
    THEORY OF CRYPTOGRAPHY, TCC 2017, PT II, 2017, 10678 : 245 - 279
  • [26] Process algebraic frameworks for the specification and analysis of cryptographic protocols
    Gorrieri, R
    Martinelli, F
    MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 2003, PROCEEDINGS, 2003, 2747 : 46 - 67
  • [27] FSM Simulation of Cryptographic Protocols Using Algebraic Processor
    Frolov, Alexander
    Vinnikov, Alexander
    PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON DEPENDABILITY AND COMPLEX SYSTEMS DEPCOS-RELCOMEX, 2014, 286 : 189 - 198
  • [28] A formal analysis for capturing replay attacks in cryptographic protocols
    Gao, Han
    Bodei, Chiara
    Degano, Pierpaolo
    Nielson, Hanne Riis
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 150 - +
  • [29] Some attacks on quantum-based cryptographic protocols
    Lo, HK
    Ko, TM
    QUANTUM INFORMATION & COMPUTATION, 2005, 5 (01) : 41 - 48
  • [30] Automatic detection of attacks on cryptographic protocols: A case study
    Cibrario, I
    Durante, L
    Sisto, R
    Valenzano, A
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, PROCEEDINGS, 2005, 3548 : 69 - 84