rotocol Specifications to Flaws and Attack cenarios: An Automatic and Formal Al
暂无分享,去创建一个
We present a new approach to the verification of authentication protocols. This approach is formal, fully automatic and does not necessitate any specification of any protocol property or invariant. It takes as parameter the protocol specification and generates the set of flaws, if any, as well as the corresponding attack scenarios. This approach involves three steps. First, protocol roles are extracted from the protocol specification. Second, the intruder abilities to perform communications and computations are generated from the protocol specification. In addition to the classical known intruder computational abilities such as encryption and decryption, we also consider those computations that result from different instrumentations of the protocol. The intruder abilities are modeled as a deductive system. Third, the extracted roles as well as the deductive system are combined to perform the verification. The latter consists
[1] Catherine A. Meadows,et al. Formal Verification of Cryptographic Protocols: A Survey , 1994, ASIACRYPT.
[2] Simon S. Lam,et al. Authentification for Distributed Systems , 1992, Computer.