Protocol Analysis with Time

We present a framework suited to the analysis of cryptographic protocols that make use of time in their execution. We provide a process algebra syntax that makes time information available to processes, and a transition semantics that takes account of fundamental properties of time. Additional properties can be added by the user if desirable. This timed protocol framework can be implemented either as a simulation tool or as a symbolic analysis tool in which time references are represented by logical variables, and in which the properties of time are implemented as constraints on those time logical variables. These constraints are carried along the symbolic execution of the protocol. The satisfiability of these constraints can be evaluated as the analysis proceeds, so attacks that violate the laws of physics can be rejected as impossible. We demonstrate the feasibility of our approach by using the Maude-NPA protocol analyzer together with an SMT solver that is used to evaluate the satisfiability of timing constraints. We provide a sound and complete protocol transformation from our timed process algebra to the Maude-NPA syntax and semantics, and we prove its soundness and completeness. We then use the tool to analyze Mafia fraud and distance hijacking attacks on a suite of distance-bounding protocols.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/22/2019

Strand Spaces with Choice via a Process Algebra Semantics

Roles in cryptographic protocols do not always have a linear execution, ...
research
04/19/2018

Homomorphisms and Minimality for Enrich-by-Need Security Analysis

Cryptographic protocols are used in different environments, but existing...
research
07/12/2023

An Efficient Canonical Narrowing Implementation with Irreducibility and SMT Constraints for Generic Symbolic Protocol Analysis

Narrowing and unification are very useful tools for symbolic analysis of...
research
02/09/2022

Protocol Insecurity with Assertions

In the study of symbolic verification of cryptographic protocols, a cent...
research
04/16/2018

Enrich-by-need Protocol Analysis for Diffie-Hellman (Extended Version)

Enrich-by-need protocol analysis is a style of symbolic protocol analysi...
research
08/26/2023

Solving the insecurity problem for assertions

In the symbolic verification of cryptographic protocols, a central probl...
research
01/12/2018

Symbolic Timed Observational Equivalence

Intruders can infer properties of a system by measuring the time it take...

Please sign up or login with your details

Forgot password? Click here to reset