CryptoVampire: Automated Reasoning for the Complete Symbolic Attacker Cryptographic Model

05/20/2023
by   Simon Jeanteur, et al.
0

Cryptographic protocols are extremely hard to design and prove correct, as witnessed by the ever-growing list of attacks even on protocol standards. Using the symbolic model of cryptography, protocols are proven correct against an idealized cryptographic model, which abstracts away from the algebraic properties of cryptographic schemes and thus misses attacks. On the other hand, existing computational models of cryptography only support interactive proofs and/or are limited to stateless protocols. A promising approach is given by the computationally complete symbolic attacker (CCSA) model, formalized in the BC logic, which aims at bridging and getting the best of the two worlds, obtaining cryptographic guarantees by symbolic protocol analysis. While machine-checked security proofs are provided in this domain, such efforts require expert knowledge both in the cryptographic space as well as on the reasoning side. In this paper, we present the CryptoVampire framework, providing the first fully automated setting for deriving proofs of trace properties in the BC logic. CryptoVampire brings a first-order formalization of protocol properties, by proposing tailored handling of subterm relations. In addition, CryptoVampire implements specialized reasoning techniques, saturation algorithms, and heuristics, allowing the direct integration of CryptoVampire within the landscape of automated theorem proving. Our experimental results showcase the effectiveness of CryptoVampire, providing also automation support for existing approaches in the area.

READ FULL TEXT
research
12/05/2020

Automated Symbolic Verification of Telegram's MTProto 2.0

MTProto 2.0 is a suite of cryptographic protocols for instant messaging ...
research
05/14/2021

On the Soundness of Infrastructure Adversaries

Companies and network operators perform risk assessment to inform policy...
research
11/16/2018

Deciding Indistinguishability

Computational indistinguishability is a key property in cryptography and...
research
09/21/2022

CryptoSolve: Towards a Tool for the Symbolic Analysis of Cryptographic Algorithms

Recently, interest has been emerging in the application of symbolic tech...
research
06/19/2018

Formal verification of the YubiKey and YubiHSM APIs in Maude-NPA

In this paper, we perform an automated analysis of two devices developed...
research
07/20/2022

PFMC: a parallel symbolic model checker for security protocol verification

We present an investigation into the design and implementation of a para...
research
02/09/2022

Protocol Insecurity with Assertions

In the study of symbolic verification of cryptographic protocols, a cent...

Please sign up or login with your details

Forgot password? Click here to reset