Authentication Tests Based on Distributed Temporal Protocol Logic for the Analysis of Security Protocols

Authentication protocols are used to ensure the identity of a participant in a distributed environment. Since designing authentication protocols is an error prone process, formal verification techniques are used to verify the correctness of authentication protocols. In this paper, we develop simple but rigorous logic-based tests for the analysis of authentication protocols. In particular, we extend the framework of Distributed Temporal Protocol Logic (DTPL), and provide authentication tests at a higher level of abstraction. These tests can be easily applied on a variety of authentication protocols, yet they are rigorous enough to capture full capabilities of a typical Dolev-Yao intruder.

[1]  Vipin Swarup,et al.  Metric Strand Spaces for Locale Authentication Protocols , 2010, IFIPTM.

[2]  Glynn Winskel,et al.  Event Structures , 1986, Advances in Petri Nets.

[3]  Luca Viganò,et al.  Metareasoning about Security Protocols using Distributed Temporal Logic , 2005, Electron. Notes Theor. Comput. Sci..

[4]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[5]  Catherine A. Meadows,et al.  Formal methods for cryptographic protocol analysis: emerging issues and trends , 2003, IEEE J. Sel. Areas Commun..

[6]  Gavin Lowe,et al.  A hierarchy of authentication specifications , 1997, Proceedings 10th Computer Security Foundations Workshop.

[7]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[8]  Grzegorz Rozenberg,et al.  Advances in Petri Nets 1985 , 1985, Lecture Notes in Computer Science.

[9]  Luca Viganò,et al.  Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis , 2005, Log. J. IGPL.

[10]  Mehmet A. Orgun,et al.  Modal tableaux for verifying stream authentication protocols , 2007, Autonomous Agents and Multi-Agent Systems.

[11]  Reiner Dojen,et al.  Formal verification: an imperative step in the design of security protocols , 2003, Comput. Networks.

[12]  Masakatsu Nishigaki,et al.  Trust Management IV - 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010. Proceedings , 2010, IFIPTM.

[13]  Paul F. Syverson,et al.  The Logic of Authentication Protocols , 2000, FOSAD.

[14]  Joshua D. Guttman,et al.  Authentication tests and the structure of bundles , 2002, Theor. Comput. Sci..

[15]  Colin J. Fidge,et al.  A survey of verification techniques for security protocols , 2001 .

[16]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).