The Inductive Approach to Verifying Cryptographic Protocols

05/13/2021
by   Lawrence C. Paulson, et al.
0

Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is based on ordinary predicate calculus and copes with infinite-state systems. Proofs are generated using Isabelle/HOL. The human effort required to analyze a protocol can be as little as a week or two, yielding a proof script that takes a few minutes to run. Protocols are inductively defined as sets of traces. A trace is a list of communication events, perhaps comprising many interleaved protocol runs. Protocol descriptions incorporate attacks and accidental losses. The model spy knows some private keys and can forge messages using components decrypted from previous traffic. Three protocols are analyzed below: Otway-Rees (which uses shared-key encryption), Needham-Schroeder (which uses public-key encryption), and a recursive protocol by Bull and Otway (which is of variable length). One can prove that event ev always precedes event ev' or that property P holds provided X remains secret. Properties can be proved from the viewpoint of the various principals: say, if A receives a final message from B then the session key it conveys is good.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/17/2019

Inductive Analysis of the Internet Protocol TLS

Internet browsers use security protocols to protect sensitive messages. ...
research
12/16/2017

Fingerprinting Cryptographic Protocols with Key Exchange using an Entropy Measure

Encryption has increasingly been used in all applications for various pu...
research
11/13/2019

Decidable Inductive Invariants for Verification of Cryptographic Protocols with Unbounded Sessions

We develop a theory of decidable inductive invariants for an infinite-st...
research
01/11/2018

Secrecy by Witness-Functions on Increasing Protocols

In this paper, we present a new formal method to analyze cryptographic p...
research
02/25/2020

Protocol Proxy: An FTE-based Covert Channel

In a hostile network environment, users must communicate without being d...
research
07/25/2023

A Novel Computationally Efficient Group Signature for Anonymous and Secure V2X Communications

The use of vehicle-to-everything (V2X) communication is expected to sign...
research
07/03/2019

Estimating Gaps in Martingales and Applications to Coin-Tossing: Constructions and Hardness

Consider designing a distributed coin-tossing protocol for n processors ...

Please sign up or login with your details

Forgot password? Click here to reset