Title :
A computationally sound mechanized prover for security protocols
Author_Institution :
CNRS, Ecole Normale Superieure, Paris
Abstract :
We present a new mechanized prover for secrecy properties of cryptographic protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the computational model. It produces proofs presented as sequences of games; these games are formalized in a probabilistic polynomial-time process calculus. Our tool provides a generic method for specifying security properties of the cryptographic primitives, which can handle shared-and public-key encryption, signatures, message authentication codes, and hash functions. Our tool produces proofs valid for a number of sessions polynomial in the security parameter, in the presence of an active adversary. We have implemented our tool and tested it on a number of examples of protocols from the literature
Keywords :
message authentication; probability; process algebra; public key cryptography; Dolev-Yao model; computational model; computationally sound mechanized prover; cryptographic primitives; cryptographic protocols; game sequences; hash functions; message authentication codes; probabilistic polynomial-time process calculus; public-key encryption; security property specification; security protocols; shared-key encryption; Calculus; Computational modeling; Cryptographic protocols; Cryptography; Mechanical factors; Message authentication; Polynomials; Public key; Security; Testing;
Conference_Titel :
Security and Privacy, 2006 IEEE Symposium on
Conference_Location :
Berkeley/Oakland, CA
Print_ISBN :
0-7695-2574-1