Strategy for Verifying Security Protocols with Unbounded Message Size

作者:Y. Chevalier, L. Vigneron

摘要

We present a system for automatically verifying cryptographic protocols. This system manages the knowledge of principals and checks if the protocol is runnable. In this case, it outputs a set of rewrite rules describing the protocol itself, the strategy of an intruder, and the goal to achieve. The protocol specification language permits to express commonly used descriptions of properties (authentication, short term secrecy, and so on) as well as complex data structures such as tables and hash functions. The generated rewrite rules can be used for detecting flaws with various systems: theorem proving in first-order logic, on-the-fly model-checking, or SAT-based state exploration. These three techniques are being experimented in the European Union project AVISPA.

论文关键词:security protocols, verification, flaw detection, intruder model, automatic strategies

论文评审过程:

论文官网地址:https://doi.org/10.1023/B:AUSE.0000017741.10347.9b