Author_Institution :
Acra Syst./Exodus Commun., Ithaca, NY, USA
Abstract :
A cryptographic protocol is a short series of message exchanges, usually involving encryption, intended to establish secure communication over an insecure network. A protocol fails if an active wiretapper can obtain confidential information or impersonate a legitimate user, without performing cryptanalysis, by blocking, replaying, relabeling or otherwise modifying messages. Since the number of possible wiretapper-induced distortions of a protocol grows exponentially with the size of the protocol, most tools for detecting protocol failure require extended, expert user guidance. The Automatic Authentication Protocol Analyzer, 2nd Version (AAPA2), in contrast, automatically correctly identifies 88% of the protocols in an independently selected collection of protocols as failed or not failed, on a modest computer, in an average of only 2.6 minutes per protocol. This paper summarizes the AAPA2´s results, sketches how it produces them and gives references providing more information
Keywords :
computer aided analysis; cryptography; formal verification; message authentication; network analysers; protocols; telecommunication computing; telecommunication security; 2.6 min; AAPA2; Automatic Authentication Protocol Analyzer, 2nd Version; active wiretapper; automatic cryptographic protocol analysis; confidential information; encryption; expert user guidance; independently selected protocol collection; insecure network; legitimate user impersonation; message blocking; message exchanges; message modification; message relabelling; message replaying; protocol failure detection; secure communication; wiretapper-induced distortions; Authentication; Contracts; Cryptographic protocols; Cryptography; Failure analysis; Feedback; Jacobian matrices; Laboratories; Libraries; Logic functions;