Tree Automata for Detecting Attacks on Protocols with Algebraic Cryptographic Primitives

被引:1
|
作者
Boichut, Yohan [1 ]
Heam, Pierre-Cyrille [2 ]
Kouchnarenko, Olga [3 ]
机构
[1] Univ Orleans, Lab Informat Fondamentale Orleans, Orleans, France
[2] ENS Cachan, CNRS, INRIA, LSV, Cachan, France
[3] CASSIS, INRIA, LIFC, Besancon, France
关键词
Security protocol; algebraic properties; automatic approximation;
D O I
10.1016/j.entcs.2009.05.030
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper extends a rewriting approximations-based theoretical framework in which the security problem - secrecy preservation against an active intruder - may be semi-decided through a reachability analysis. In a recent paper, we have shown how to semi-decide whether a security protocol using algebraic properties of cryptographic primitives is safe. In this paper, we investigate the dual - insecurity - problem: we explain how to semi-decide whether a protocol using cryptographic primitive algebraic properties is unsafe. This improvement offers us to draw automatically a complete diagnostic of a security protocol with an unbounded number of sessions. Furthermore, our approach is supported by the tool TA4SP successfully applied for analysing the NSPK-xor protocol and the Diffie-Hellman protocol.
引用
收藏
页码:57 / 72
页数:16
相关论文
共 50 条
  • [31] Algebraic Attacks against Some Arithmetization-Oriented Primitives
    Bariant, Augustin
    Bouvier, Clemence
    Leurent, Gaetan
    Perrin, Leo
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2022, 2022 (03) : 73 - 101
  • [32] Detecting collusion attacks in security protocols
    Chen, QF
    Chen, YPP
    Zhang, SC
    Zhang, CQ
    FRONTIERS OF WWW RESEARCH AND DEVELOPMENT - APWEB 2006, PROCEEDINGS, 2006, 3841 : 297 - 306
  • [33] Securing Software Cryptographic Primitives for Embedded Systems against Side Channel Attacks
    Agosta, Giovanni
    Barenghi, Alessandro
    Pelosi, Gerardo
    2014 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2014,
  • [34] Algebraic Replay Attacks on Authentication in RFID Protocols
    Chikouche, Noureddine
    Cherif, Foudil
    Benmohammed, Mohamed
    ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS, 2013, 381 : 153 - +
  • [35] First implementation of cryptographic protocols based on algebraic number fields
    Meyer, A
    Neis, S
    Pfahler, T
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 84 - 103
  • [36] Quantum communication attacks on classical cryptographic protocols: (invited talk)
    Damgård, Ivan
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, 6673 LNCS
  • [37] Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties
    Lafourcade, Pascal
    Puys, Maxime
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 137 - 155
  • [38] Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks
    Fischlin, Marc
    Mazaheri, Sogol
    IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018), 2018, : 76 - 90
  • [39] Predicting New Attacks: A Case Study in Security Analysis of Cryptographic Protocols
    Bao, Da
    Wagatsuma, Kazunori
    Gao, Hongbiao
    Cheng, Jingde
    ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURETECH & MUE, 2016, 393 : 263 - 270
  • [40] On the security of αη: Response to 'some attacks on quantum-based cryptographic protocols'
    Yuen, Horace P.
    Nair, Ranjith
    Corndorf, Eric
    Kanter, Gregory S.
    Kumar, Prem
    Quantum Information and Computation, 2006, 6 (07): : 561 - 582