The Theory of Witness-Functions

Cryptographic protocols are distributed programs that ensure security in all communications. They guarantee agents authentication, data confidentiality, data integrity, atomicity of goods and money, non-repudiation, etc. They are used in all areas: e-commerce, military fields, electronic voting, etc. The use of cryptography is essential to ensure protocols’ security, however, it is not sufficient. Indeed, in the literature, a significant number of cryptographic protocols have long been considered safe, but they were shown faulty many years after their use. Saying that a protocol is correct or not is an undecidable problem in general. However, several methods (logic-based methods, Model-Checking-based methods, typing-based methods, etc.) have emerged to answer this hard question under restrictive assumptions and led to varying results. Here, we present a new formal method to analyze cryptographic protocols statically for the property of secrecy. It consists in inspecting the level of security of every component of exchanged messages in the protocol by new metrics, called witness-functions, and making sure that it does not diminish during its life cycle. If yes, we declare that the protocol keeps its secret inputs. We analyze here an amended version of the Woo-Lam protocol using the witness-functions’ theory.

[1]  Steve A. Schneider,et al.  A decision procedure for the existence of a rank function , 2005, J. Comput. Secur..

[2]  Siraj Ahmed Shaikh,et al.  Analysing the Woo-Lam Protocol Using CSP and Rank Functions , 2006, J. Res. Pract. Inf. Technol..

[3]  Hamido Fujita,et al.  Secrecy of cryptographic protocols under equational theory , 2009, Knowl. Based Syst..

[4]  Mohamed Mejri,et al.  A Semi-Decidable Procedure for Secrecy in Cryptographic Protocols , 2014, ArXiv.

[5]  Mohamed Mejri,et al.  Ensuring the Correctness of Cryptographic Protocols with Respect to Secrecy , 2008, SECRYPT.

[6]  Steve A. Schneider,et al.  Verifying Security Protocols: An Application of CSP , 2004, 25 Years Communicating Sequential Processes.

[7]  Sebastian Mödersheim,et al.  The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.

[8]  Véronique Cortier,et al.  Protocol Composition for Arbitrary Primitives , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.

[9]  Nadia Tawbi,et al.  Formal automatic verification of authentication cryptographic protocols , 1997, First IEEE International Conference on Formal Engineering Methods.

[10]  Mohamed Mejri,et al.  Secrecy by Witness Functions , 2014, FMS @ Petri Nets.

[11]  Nadia Tawbi,et al.  From protocol specifications to flaws and attack scenarios: an automatic and formal algorithm , 1997, Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[12]  Véronique Cortier,et al.  Safely composing security protocols , 2009, Formal Methods Syst. Des..

[13]  Mohamed Mejri,et al.  Practical and Universal Interpretation Functions for Secrecy , 2007, SECRYPT.

[14]  Mohamed Mejri,et al.  Secrecy by witness-functions on increasing protocols , 2014, Proceedings of the 2014 6th International Conference on Electronics, Computers and Artificial Intelligence (ECAI).

[15]  Steve A. Schneider Security properties and CSP , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[16]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[17]  Véronique Cortier Secure Composition of Protocols , 2011, TOSCA.

[18]  Véronique Cortier,et al.  A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems , 2011, Journal of Automated Reasoning.

[19]  Mourad Debbabi,et al.  An environment for the specification and analysis of cryptoprotocols , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[20]  Mohamed Mejri,et al.  Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method , 2012, J. Comput. Networks Commun..

[21]  Steve A. Schneider Verifying Authentication Protocols in CSP , 1998, IEEE Trans. Software Eng..

[22]  Véronique Cortier,et al.  Decidability and Combination Results for Two Notions of Knowledge in Security Protocols , 2012, Journal of Automated Reasoning.

[23]  Mohamed Mejri,et al.  NEW FUNCTIONS FOR SECRECY ON REAL PROTOCOLS , 2014 .

[24]  Véronique Cortier,et al.  Deciding security properties for cryptographic protocols. application to key cycles , 2007, TOCL.