Title :
Modelling Attacker with Deciding Security Properties by Induction and Deduction
Author :
Kirsal-Ever, Yoney ; Eneh, A. ; Gemikonakli, Orhan ; Mostarda, L.
Author_Institution :
Sch. of Sci. & Technol., Middlesex Univ., London, UK
Abstract :
Formal methods for verifying cryptographic protocols are used to assist in ensuring that authentication protocols meet their specifications. Model checking techniques such as CSP and FDR checker, are widely acknowledged for effectively and efficiently revealing flaws in protocols faster than most other contemporaries. Essentially, model checking involves a detailed search of all the states reachable by the components of a protocol model. In the models that describe authentication protocols, the components, regarded as processes, are the principals including intruder (attacker) and parameters for authentication such as keys, nonces, tickets, and certificates. In this paper, transactions of proposed protocol models rely on trusted three-way authentication mechanisms while intruder capabilities are based on possible inductions and deductions of sequential processes. This research attempts to combine the two methods in model checking in order to realise an abstract description of intruder with enhanced capabilities.
Keywords :
cryptographic protocols; formal verification; message authentication; attacker modelling; authentication protocols; cryptographic protocols; formal method; protocol model checking; security property; trusted three way authentication mechanism; Authentication; Cryptographic protocols; Cryptography; Educational institutions; Model checking; CSP; FDR checker; Formal verification methods;
Conference_Titel :
Advanced Information Networking and Applications Workshops (WAINA), 2013 27th International Conference on
Conference_Location :
Barcelona
Print_ISBN :
978-1-4673-6239-9
Electronic_ISBN :
978-0-7695-4952-1
DOI :
10.1109/WAINA.2013.16