DocumentCode :
317251
Title :
From protocol specifications to flaws and attack scenarios: an automatic and formal algorithm
Author :
Debbabi, M. ; Mejre, M. ; Tawbi, N. ; Yahmadi, I.
Author_Institution :
Comput. Sci. Dept., Laval Univ., Que., Canada
fYear :
1997
fDate :
18-20 Jun 1997
Firstpage :
256
Lastpage :
261
Abstract :
Presents a new approach to the verification of authentication protocols. This approach is formal, fully automatic and does not necessitate any specification of any protocol property or invariant. It takes the protocol specification as the parameter and generates the set of flaws, if any, as well as the corresponding attack scenarios. This approach involves three steps. First, protocol roles are extracted from the protocol specification. Second, the intruder´s abilities to perform communication and computation are generated from the protocol specification. In addition to the classical, known intruder computational abilities, such as encryption and decryption, we also consider those computations that result from different instrumentations of the protocol. The intruder´s abilities are modeled as a deductive system. Third, the extracted roles as well as the deductive system are combined to perform the verification. The latter consists in checking whether the intruder can answer all the challenges uttered by a particular role. If that is the case, an attack scenario is automatically constructed. To exemplify the usefulness and efficiency of our approach, we illustrate it on the Woo and Lam (1994) authentication protocol
Keywords :
cryptography; formal specification; formal verification; message authentication; protocols; attack scenarios; authentication protocol specifications; automatic formal algorithm; decryption; deductive system; encryption; flaws; formal verification; intruder communication abilities; intruder computational abilities; protocol instrumentations; protocol roles; Authentication; Bibliographies; Computer errors; Computer science; Computer security; Cryptographic protocols; Cryptography; Distributed computing; Instruments; Surges;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Enabling Technologies: Infrastructure for Collaborative Enterprises, 1997. Proceedings., Sixth IEEE Workshops on
Conference_Location :
Cambridge, MA
Print_ISBN :
0-8186-7967-0
Type :
conf
DOI :
10.1109/ENABL.1997.630823
Filename :
630823
Link To Document :
بازگشت