skip to main content
10.1145/1368310.1368324acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

On the protocol composition logic PCL

Published:18 March 2008Publication History

ABSTRACT

A recent development in formal security protocol analysis is the Protocol Composition Logic (PCL). We identify a number of problems with this logic as well as with extensions of the logic, as defined in [9, 13, 14, 17, 20, 21]. The identified problems imply strong restrictions on the scope of PCL, and imply that some currently claimed PCL proofs cannot be proven within the logic, or make use of unsound axioms. Where possible, we propose solutions for these problems.

References

  1. A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, L. Cuellar, P. Drielsma, P. Heám, O. Kouchnarenko, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganò, and L. Vigneron. The AVISPA tool for the automated validation of internet security protocols and applications. volume 3576 of Lecture Notes in Computer Science, pages 281--285. Springer-Verlag, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. Basin, S. Mödersheim, and L. Viganò. An on-the-fly model-checker for security protocol analysis. In ESORICS, volume 2808 of Lecture Notes in Computer Science, pages 253--270. Springer-Verlag, 2003.Google ScholarGoogle Scholar
  3. M. Bellare and P. Rogaway. Entity authentication and key distribution. In CRYPTO '93: Proceedings of the 13th annual international cryptology conference on Advances in cryptology, pages 232--249, New York, NY, USA, 1994. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. B. Blanchet. An efficient cryptographic protocol verifier based on Prolog rules. In Proc. 14th IEEE Computer Security Foundations Workshop (CSFW), pages 82--96. IEEE Computer Society, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. E. Bresson, Y. Lakhnech, L. Mazaré, and B. Warinschi. A generalization of DDH with applications to protocol analysis and computational soundness. In A. J. Menezes, editor, Proc. of Crypto '07, volume 4622 of Lecture Notes in Computer Science, pages 482--499. Springer-Verlag, August 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Burrows, M. Abadi, and R. Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(1):18--36, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C. Cremers. Scyther - Semantics and Verification of Security Protocols. PhD thesis, Computer Science Department, Eindhoven University of Technology, November 2006.Google ScholarGoogle Scholar
  8. C. Cremers, S. Mauw, and E. de Vink. Injective synchronisation: an extension of the authentication hierarchy. Theoretical Computer Science, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Datta. Security Analysis of Network Protocols: Compositional Reasoning and Complexity-theoretic Foundations. PhD thesis, Computer Science Department, Stanford University, September 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Datta, A. Derek, J. Mitchell, and D. Pavlovic. A derivation system for security protocols and its logical formalization. In Proc. 16th IEEE Computer Security Foundations Workshop (CSFW), pages 109--125. IEEE Computer Society, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  11. A. Datta, A. Derek, J. Mitchell, and D. Pavlovic. Abstraction and refinement in protocol derivation. In Proc. 17th IEEE Computer Security Foundations Workshop (CSFW), pages 30--45, Washington, DC, USA, June 2004. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. Datta, A. Derek, J. Mitchell, and D. Pavlovic. Secure protocol composition. Electron. Notes Theor. Comput. Sci., 83, 2004. Proceedings of 19th Annual Conference on Mathematical Foundations of Programming Semantics.Google ScholarGoogle Scholar
  13. A. Datta, A. Derek, J. Mitchell, and D. Pavlovic. A derivation system and compositional logic for security protocols. Journal of Computer Security, 13(3):423--482, 2005. Google ScholarGoogle ScholarCross RefCross Ref
  14. A. Datta, A. Derek, J. Mitchell, and A. Roy. Protocol Composition Logic (PCL). Electron. Notes Theor. Comput. Sci., 172:311--358, 2007. Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin. Editors: L. Cardelli, M. Fiore, and G. Winskel. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. Datta, A. Derek, J. Mitchell, and B. Warinschi. Computationally sound compositional logic for key exchange protocols. Proc. 19th IEEE Computer Security Foundations Workshop (CSFW), 0:321--334, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. Datta, A. Derek, J. C. Mitchell, and D. Pavlovic. Secure protocol composition (extended abstract). In FMSE '03: Proceedings of the 2003 ACM workshop on Formal methods in security engineering, pages 11--23, New York, NY, USA, 2003. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. A. Derek. Formal Analysis of Security Protocols: Protocol Composition Logic. PhD thesis, Computer Science Department, Stanford University, December 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. N. Durgin, J. Mitchell, and D. Pavlovic. A compositional logic for protocol correctness. In Proc. 14th IEEE Computer Security Foundations Workshop (CSFW), pages 241--272, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. N. Durgin, J. Mitchell, and D. Pavlovic. A compositional logic for proving security properties of protocols. Journal of Computer Security, 11:667--721, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. C. He. Analysis of Security Protocols for Wireless Networks. PhD thesis, Department of Electrical Engineering, Stanford University, December 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. C. He, M. Sundararajan, A. Datta, A. Derek, and J. Mitchell. A modular correctness proof of IEEE 802.11i and TLS. In CCS '05: Proceedings of the 12th ACM conference on Computer and communications security, pages 2--15. ACM Press, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. G. Lowe. Casper: A compiler for the analysis of security protocols. In Proc. 10th IEEE Computer Security Foundations Workshop (CSFW), pages 18--30. IEEE Computer Society, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. G. Lowe. A hierarchy of authentication specifications. In Proc. 10th IEEE Computer Security Foundations Workshop (CSFW), pages 31--44. IEEE Computer Society, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. A. Roy, A. Datta, A. Derek, J. C. Mitchell, and J.-P. Seifert. Secrecy analysis in protocol composition logic. In M. Okada and I. Satoh, editors, Proceedings of 11th Annual Asian Computing Science Conference, Lecture Notes in Computer Science, December 2006. Preliminary version. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Reviews

Wolfgang Schreiner

It has long been recognized that the analysis of the security of computing systems needs a formal basis to adequately argue about possibilities of attacks and the means to prevent them. A recent approach in this area is the protocol composition logic (PCL), a logic for security protocols around which a rich body of literature has emerged; it has been applied to numerous case studies, and various extensions have been proposed. This paper reviews this body of work and identifies a number of problems in basic PCL, as well as in its extensions; Cremers discusses these problems thoroughly, describes their implications, and outlines the solutions. In a nutshell, PCL is less expressive than originally believed-certain interesting properties cannot actually be proved from the logical calculus; furthermore, an extension uses an unsound axiom from which wrong conclusions can be derived. The arguments are given by investigating the structure of derivation rules and by examples of protocol behaviors not adequately captured by the logic. The paper, while well written and addressing an interesting topic, discusses mainly previous results and is therefore only accessible to experts proficient in these. However, there is a common thread that is unfortunately not highlighted: the ultimate source of problems is apparently a research methodology where claims are published that are justified only by proof sketches, with hidden assumptions and an informal reasoning style. This paper seems to indicate that this is not sufficient and new methodologies-computer-supported proof checking-should be considered. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    ASIACCS '08: Proceedings of the 2008 ACM symposium on Information, computer and communications security
    March 2008
    399 pages
    ISBN:9781595939791
    DOI:10.1145/1368310

    Copyright © 2008 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 18 March 2008

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    Overall Acceptance Rate418of2,322submissions,18%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader