首页> 外文学位 >Logical analysis and complexity of security protocols.
【24h】

Logical analysis and complexity of security protocols.

机译:逻辑分析和安全协议的复杂性。

获取原文
获取原文并翻译 | 示例

摘要

We formalize the Dolev-Yao model of security protocols using two different notations, one based on multiset rewriting with existentials, and the other based on a process calculus combined with Hoare logic-style logical assertions. The goal is to provide simple formal notations for describing and proving security properties about protocols that use nonces (randomly generated numbers that uniquely identify a protocol session) and public- and symmetric-key cryptography. In the first part of the paper, we formalize the assumptions of the Dolev-Yao model and analyze the complexity of the secrecy problem under various restrictions. We use multiset rewriting to prove that, even for the case where we restrict the size of messages and the depth of message encryption, the secrecy problem is undecidable for the case of an unrestricted number of protocol roles and an unbounded number of new nonces. We also identify several decidable classes, including a DEXP-complete class when the number of nonces is restricted, and an NP-complete class when both the number of nonces and the number of roles is restricted. In the second part of the paper we define a logic, designed around a process calculus with actions for each possible protocol step, that consists of axioms about protocol actions and inference rules that yield assertions about protocols composed of multiple steps. Although assertions are written using only steps of the protocol, the logic is sound in a stronger sense: each provable assertion about an action or sequence of actions holds in any run of the protocol that contains the given actions and arbitrary additional actions by a malicious attacker. This approach lets us prove security properties of protocols under attack while reasoning only about the sequence of actions taken by honest parties to the protocol.
机译:我们使用两种不同的表示形式对安全协议的Dolev-Yao模型进行形式化,一种表示基于具有存在性的多集重写,另一种表示基于结合了Hoare逻辑样式逻辑断言的过程演算。目的是提供简单的正式符号,以描述和证明有关使用随机数(随机生成的数字,唯一标识协议会话)的协议以及公共密钥和对称密钥加密的安全属性。在本文的第一部分中,我们将Dolev-Yao模型的假设形式化,并分析了各种约束条件下保密问题的复杂性。我们使用多集重写来证明,即使对于限制消息大小和消息加密深度的情况,对于协议角色数目不受限制且新随机数数目不受限制的情况,保密问题也是无法确定的。我们还确定了几个可确定的类,包括当随机数受到限制时的DEXP完全类,以及当随机数和角色数量都受到限制的NP完全类。在本文的第二部分中,我们定义了一种逻辑,该逻辑是围绕过程演算而设计的,具有针对每个可能的协议步骤的动作,该逻辑由关于协议动作的公理和推断规则组成,这些推理规则产生关于由多个步骤组成的协议的断言。尽管断言仅使用协议的步骤来编写,但逻辑上听起来更合理:关于一个动作或一系列动作的每个可证明断言都包含在协议的任何运行中,其中包含给定动作和恶意攻击者的任意其他动作。这种方法使我们能够证明受到攻击的协议的安全属性,同时仅推理协议诚实方采取的操作顺序。

著录项

  • 作者

    Durgin, Nancy Ann.;

  • 作者单位

    Stanford University.;

  • 授予单位 Stanford University.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2003
  • 页码 p.1332
  • 总页数 179
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 自动化技术、计算机技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号