Title :
Proving properties of security protocols by induction
Author :
Paulson, Lawrence C.
Author_Institution :
Comput. Lab., Cambridge Univ., UK
Abstract :
Informal justifications of security protocols involve arguing backwards that various events are impossible. Inductive definitions can make such arguments rigorous. The resulting proofs are complicated, but can be generated reasonably quickly using the proof tool Isabelle/HOL. There is no restriction to finite state systems and the approach is not based on belief logics. Protocols are inductively defined as sets of traces, which may involve many interleaved protocol runs. Protocol descriptions model accidental key losses as well as attacks. The model spy can send spoof messages made up of components decrypted from previous traffic. Several key distribution protocols have been studied, including Needham-Schroeder, Yahalom and Otway-Rees. The method applies to both symmetric key and public key protocols. A new attack has been discovered in a variant of Otway-Rees (already broken by W. Mao and C. Boyd (1993)). Assertions concerning secrecy and authenticity have been proved
Keywords :
formal verification; program verification; protocols; security of data; theorem proving; accidental key losses; assertion proving; authenticity; belief logics; finite state systems; induction; inductive definition; inductive definitions; informal justifications; interleaved protocol runs; key distribution protocols; model spy; proof tool Isabelle/HOL; protocol descriptions; public key protocols; secrecy; security protocols; spoof messages; symmetric key; Accidents; Body sensor networks; Concrete; Laboratories; Logic; Protocols; Public key; Security; State-space methods; Traffic control;
Conference_Titel :
Computer Security Foundations Workshop, 1997. Proceedings., 10th
Conference_Location :
Rockport, MA
Print_ISBN :
0-8186-7990-5
DOI :
10.1109/CSFW.1997.596788