Abstract
Cryptographic protocols are formally specified as a system of protocol agents using asynchronous product automata (APA). APA are a universal and very flexible operational description concept for communicating automata. Their specification, analysis and verification is supported by the SH-verification tool (SHVT). The local state of each agent is structured in several components describing its knowledge of keys, its "view" of the protocol and the goals to be reached within the protocol. Communication is modeled by adding messages to and removing them from a shared state component network. Cryptography is modeled by symbolic functions with certain properties. In addition to the regular protocol agents an intruder is specified, which has no access to the agents' local states but to the network. The intruder may intercept messages and create new ones based on his initial knowledge and on what he can extract from intercepted messages. Violations of the security goals can be found by state space analysis performed by the SHVT. The method is demonstrated using the symmetric Needham-Schroeder protocol, and an attack is presented that does not involve compromised session keys. Our approach defers from others in that protocol specifications do not use implicit assumptions, thus protocol security does not depend on whether some implicit assumptions made are reasonable for a particular environment. Therefore, our protocol specifications explicitly provide relevant information for secure implementations.
| Original language | English |
|---|---|
| Title of host publication | Proceedings - 13th International Workshop on Database and Expert Systems Applications, DEXA 2002 |
| Publisher | IEEE, Institute of Electrical and Electronics Engineers |
| Pages | 473-479 |
| Number of pages | 7 |
| Volume | 2002-January |
| ISBN (Electronic) | 0769516688 |
| DOIs | |
| Publication status | Published - 1 Jan 2002 |
| Externally published | Yes |
| Event | International Workshop on Trust and Privacy in Digital Business 2002 - Aix-en-Provence, France Duration: 2 Sept 2002 → 6 Sept 2002 https://ieeexplore.ieee.org/xpl/conhome/8104/proceeding (Proceedings) |
Conference
| Conference | International Workshop on Trust and Privacy in Digital Business 2002 |
|---|---|
| Abbreviated title | TrustBus 2002 |
| Country/Territory | France |
| City | Aix-en-Provence |
| Period | 2/09/02 → 6/09/02 |
| Other | Held within the "International Conference on Database and Expert Systems Applications 2002" |
| Internet address |
|
Keywords
- Access protocols
- Algorithm design and analysis
- Authentication
- Automata
- Cryptographic protocols
- Cryptography
- Information security
- Performance analysis
- Power system modeling
- State-space methods