Verifying security protocols by knowledge analysis

This paper describes a new interactive method to analyse knowledge of participants involved in security protocols and further to verify the correctness of the protocols. The method can detect attacks and flaws involving interleaving sessions besides normal attacks. The implementation of the method in a generic theorem proving environment, namely Isabelle, makes the verification of protocols mechanical and efficient; it can verify a medium-sized security protocol in less than ten seconds. As an example, the paper finds the flaw in the Needham-Schroeder public key authentication protocol and proves the secure properties and guarantees of the protocol with Lowe's fix to show the effectiveness of this method.

[1]  Catherine A. Meadows,et al.  Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches , 1996, ESORICS.

[2]  Jin-Young Choi,et al.  Formal verification of PAP and EAP-MD5 protocols in wireless networks: FDR model checking , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..

[3]  Fabio Massacci,et al.  An overview of the verification of SET , 2005, International Journal of Information Security.

[4]  Xiaoqi Ma,et al.  Knowledge Based Approach for Mechanically Verifying Security Protocols , 2005, IJCAI.

[5]  Xiaoqi Ma,et al.  Formal verification of the Merchant Registration phase of the SET protocol , 2005, Int. J. Autom. Comput..

[6]  Chengqi Zhang,et al.  The Verification Logic for Secure Transaction Protocols , 2002 .

[7]  Chengqi Zhang,et al.  ENDL: A Logical Framework for Verifying Secure Transaction Protocols , 2003, Knowledge and Information Systems.

[8]  Gavin Lowe,et al.  An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..

[9]  Dominique Bolignano An approach to the formal verification of cryptographic protocols , 1996, CCS '96.

[10]  Catherine A. Meadows,et al.  The NRL Protocol Analyzer: An Overview , 1996, J. Log. Program..

[11]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[12]  Tobias Nipkow,et al.  A Proof Assistant for Higher-Order Logic , 2002 .

[13]  Gavin Lowe,et al.  Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.

[14]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[15]  Lawrence C. Paulson,et al.  The Inductive Approach to Verifying Cryptographic Protocols , 2021, J. Comput. Secur..

[16]  Xiaoqi Ma,et al.  Proving secure properties of cryptographic protocols , 2005 .

[17]  Lawrence C. Paulson,et al.  Proving properties of security protocols by induction , 1997, Proceedings 10th Computer Security Foundations Workshop.

[18]  Lawrence C. Paulson Mechanized Proofs of Security Protocols: Needham-Schroeder with Public Keys , 1997 .

[19]  Armin Liebl,et al.  Authentication in distributed systems: a bibliography , 1993, OPSR.