首页> 外文期刊>ACM transactions on computational logic >Automated Verification of Equivalence Properties of Cryptographic Protocols
【24h】

Automated Verification of Equivalence Properties of Cryptographic Protocols

机译:自动验证密码协议的等效属性

获取原文
获取原文并翻译 | 示例

摘要

Indistinguishability properties are essential in formal verification of cryptographic protocols. They are needed to model anonymity properties, strong versions of confidentiality, and resistance against offline guessing attacks. Indistinguishability properties can be conveniently modeled as equivalence properties. We present a novel procedure to verify equivalence properties for a bounded number of sessions of cryptographic protocols. As in the applied pi calculus, our protocol specification language is parametrized by a first-order sorted term signature and an equational theory that allows formalization of algebraic properties of cryptographic primitives. Our procedure is able to verify trace equivalence for determinate cryptographic protocols. On determinate protocols, trace equivalence coincides with observational equivalence, which can therefore be automatically verified for such processes. When protocols are not determinate, our procedure can be used for both under- and over-approximations of trace equivalence, which proved successful on examples. The procedure can handle a large set of cryptographic primitives, namely those whose equational theory is generated by an optimally reducing convergent rewrite system. The procedure is based on a fully abstract modelling of the traces of a bounded number of sessions of the protocols into first-order Horn clauses on which a dedicated resolution procedure is used to decide equivalence properties. We have shown that our procedure terminates for the class of subterm convergent equational theories. Moreover, the procedure has been implemented in a prototype tool Active Knowledge in Security Protocols and has been effectively tested on examples. Some of the examples were outside the scope of existing tools, including checking anonymity of an electronic voting protocol due to Okamoto.
机译:不可区分属性对于加密协议的形式验证至关重要。需要使用它们来建模匿名属性,强版本的机密性和抵抗脱机猜测攻击的能力。不可区分性可以方便地建模为等效性。我们提出了一种新颖的程序来验证密码协议会话的有限数量的等效性。像在应用的pi演算中一样,我们的协议规范语言是通过一阶排序的术语签名和方程式理论进行参数化的,该方程式理论允许形式化密码原语的代数性质。我们的过程能够验证确定的加密协议的跟踪等效性。在确定的协议上,痕量对等与观测对等重合,因此可以针对此类过程自动进行验证。当协议不确定时,我们的程序可用于痕量对等的上下近似,在示例中证明是成功的。该过程可以处理大量密码原语,即其方程式理论是通过最佳还原收敛重写系统生成的。该过程基于对协议的有限数目的会话的痕迹的完全抽象建模,该模型将其转换为一阶Horn子句,在该子句上使用专用的解析过程来确定等效属性。我们已经表明,对于子项收敛方程理论,该过程终止。此外,该过程已在“安全协议中的主动知识”原型工具中实现,并已在示例上进行了有效测试。其中一些示例超出了现有工具的范围,其中包括检查由于冈本而导致的电子投票协议的匿名性。

著录项

  • 来源
    《ACM transactions on computational logic》 |2016年第4期|23.1-23.32|共32页
  • 作者单位

    Univ Missouri, Dept Comp Sci, 201 Engn Bldg West, Columbia, MO 65203 USA;

    Univ Kent, Canterbury CT2 7NZ, Kent, England|LORIA, Campus Sci,BP 239, F-54506 Vandoeuvre Les Nancy, France;

    Alexandru Ioan Cuza Univ, Fac Comp Sci, 16 Gen Berthelot St, Iasi 700483, Romania;

    Inria Nancy Grand Est, Villers Les Nancy, France|LORIA, Campus Sci,BP 239, F-54506 Vandoeuvre Les Nancy, France;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Security; Verification;

    机译:安全性;验证;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号