Abstract
We study the verification of secrecy and authenticity properties for cryptographic protocols which rely on symmetric shared keys. The verification can be reduced to check whether a certain parallel program which models the protocol and the specification can reach an erroneous state while interacting with an adversary. Assuming finite principals, we present a decision procedure for the reachability problem which is based on a ‘symbolic’ reduction system.
A full version of this paper is available as INRIA Research Report 3915, March 2000. The first author is a member of Action INRIA ‘MIMOSA’ and he is partially supported by WG-CONFER and RNRT-Marvel.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
M. Abadi and A. Gordon. A calculus for cryptographic protocols: the spi calculus. In Proc. ACM Computer and Comm. Security, 1997.
R. Amadio and S. Prasad. The game of the name in cryptographic tables. In Proc. ASIAN99, SLNCS 1742, pages 15–26, 1999.
M. Boreale, R. De Nicola, and R. Pugliese. Proof techniques for cryptographic processes. In Proc. IEEE Logic in Comp. Sci., 1999.
D. Bolignano. Formal verification of cryptographic protocols. In Proc. ACM Conference on Computer Communication and Security, 1996.
M. Boreale. Symbolic analysis of cryptographic protocols in the spi-calculus. Personal communication, 2000.
H. Comon, M. Dauchet, R. Gilleron, F. Jacquemard, D. Lugiez, S. Tison, and M. Tommasi. Tree Automata Techniques and Applications. Draft available at http://www.grappa.univ-lille3.fr/tata.
J. Clark and J. Jacob. A survey of authentication protocol literature: Version 1.0. Technical report, 1997. Available at http://www.cs.york.ac.uk/ ~jac/papers/drareview.ps.gz.
E. Clarke, S. Jha, and W. Marrero. Using state space exploration and a natural deduction style message derivation engine to verify security protocols. In Proc. IFIP Conf. on Progr. Concepts and Methods (PROCOMET), 1998.
N. Durgin, P. Lincoln, J. Mitchell, and A. Scedrov. Undecidability of bounded security protocols. In Proc. Formal methods and security protocols, FLOC Workshop, Trento, 1999.
D. Dolev and A. Yao. On the security of public key protocols. IEEE Trans. on Information Theory, 29(2):198–208, 1983.
A. Huima. Efficient infinite-state analysis of security protocols. In Proc. Formal methods and security protocols, FLOC Workshop, Trento, 1999.
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol Using FDR. In Proc. TACAS, SLNCS, 1996.
C. Meadows. A model of computation for the nrl protocol analyzer. In Proc. IEEE Computer Security Foundations Workshop, 1994.
J. Mitchell, M. Mitchell, and U. Stern. Automated analysis of cryptographic protocols using murø. In Proc. IEEE Symp. on Security and Privacy, 1997.
D. Monniaux. Abstracting cryptographic protocols with tree automata. In Proc. Static Analysis Symp., SLNCS, 1999.
L. Paulson. Proving properties of security protocols by induction. In Proc. IEEE Computer Security Foundations Workshop, 1997.
L. Paulson. Proving security protocols correct. In Proc. IEEE Logic in Comp. Sci., 1999.
S. Schneider. Security properties and CSP. In Proc. IEEE Symp. Security and Privacy, 1996.
C. Weidenbach. Towards an automatic analysis of security protocols in first-order logic. In Proc. CADE 99. SLNCS 1632, 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Amadio, R.M., Lugiez, D. (2000). On the Reachability Problem in Cryptographic Protocols. In: Palamidessi, C. (eds) CONCUR 2000 — Concurrency Theory. CONCUR 2000. Lecture Notes in Computer Science, vol 1877. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44618-4_28
Download citation
DOI: https://doi.org/10.1007/3-540-44618-4_28
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67897-7
Online ISBN: 978-3-540-44618-7
eBook Packages: Springer Book Archive