Title
Formal Automatic Verification of Authentication Cryptographic Protocols
Abstract
We address the formal analysis of authentication cryptographic protocols. We present a new verification algorithm that generates from the protocol description the set of possible flaws, if any, as well as the corresponding attack scenarios. This algorithm does not require any property or invariant specification. The algorithm involves three steps: extracting the protocol roles, modeling the intruder abilities and verification. In addition to the classical known intruder computational abilities such as encryption and decryption, we also consider those computations that result from different instrumentations of the protocol. The intruder abilities are modeled as a deductive system. The verification is based on the extracted roles as well as the deductive system. It consists in checking whether the intruder can answer all the challenges uttered by a particular role. If it is the case, an attack scenario is automatically constructed. The extracted proof system does not ensure the termination of deductions. For that purpose, we present a general transformation schema that allows one to automatically rewrite the non-terminating proof system into a terminating one. The transformation schema is shown to be correct. To exemplify the usefulness and efficiency of our approach, we illustrate it on the Woo and Lam (1992) authentication protocol. Abadi and Needham have shown that the protocol is insecure and they proposed a new corrected version. Thanks to this method we have discovered new unknown flaws in the Woo and Lam protocol and in the corrected version of Abadi and Needham.
Year
DOI
Venue
1997
10.1109/ICFEM.1997.630399
Hiroshima, Japan
Keywords
DocType
ISBN
lam protocol,lam authentication protocol,authentication cryptographic protocols,non-terminating proof system,formal automatic verification,classical known intruder computational,authentication cryptographic protocol,intruder ability,protocol role,proof system,protocol description,deductive system,message authentication,authentication protocol,cryptographic protocols,termination,role models,formal verification,cryptography,algorithm,cryptographic protocol,authentication,protocols
Conference
0-8186-8002-4
Citations 
PageRank 
References 
11
0.62
5
Authors
4
Name
Order
Citations
PageRank
M. Debbabi1606.48
Mejri, M.2110.62
Tawbi, N.3161.37
I. Yahmadi4201.12