Rewriting-Based Verification of Authentication Protocols

Abstract We propose a method of formally analysing security protocols based on rewriting. The method is roughly as follows. A security protocol is modeled as an observational transition system, which is described in CafeOBJ. Proof scores showing that the protocol has safety (security) properties are then written in CafeOBJ and the proof scores are executed (rewritten) by the CafeOBJ system.

[1]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[2]  Kazuhiro Ogata,et al.  Formal Analysis of Suzuki & Kasami Distributed Mutual Exclusion Algorithm , 2002, FMOODS.

[3]  Joseph A. Goguen,et al.  A hidden agenda , 2000, Theor. Comput. Sci..

[4]  Steve A. Schneider Verifying Authentication Protocols in CSP , 1998, IEEE Trans. Software Eng..

[5]  Kazuhiro Ogata,et al.  Modeling and verification of distributed real-time systems based on CafeOBJ , 2001, Proceedings 16th Annual International Conference on Automated Software Engineering (ASE 2001).

[6]  Gavin Lowe,et al.  An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..

[7]  John C. Mitchell,et al.  A meta-notation for protocol analysis , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.

[8]  F. Javier Thayer Fábrega,et al.  Strand spaces: proving security protocols correct , 1999 .

[9]  K. Mani Chandy,et al.  Parallel program design - a foundation , 1988 .

[10]  Razvan Diaconescu,et al.  Behavioural Coherence in Object-Oriented Algebraic Specification , 2000, J. Univers. Comput. Sci..

[11]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[12]  Lawrence C. Paulson,et al.  The Inductive Approach to Verifying Cryptographic Protocols , 2021, J. Comput. Secur..

[13]  Joseph A. Goguen,et al.  Web-Based Support for Cooperative Software Engineering , 2001, Ann. Softw. Eng..

[14]  Jieh Hsiang,et al.  Refutational Theorem Proving Using Term-Rewriting Systems , 1985, Artif. Intell..

[15]  Joseph A. Goguen,et al.  Software Engineering with Obj: Algebraic Specification In Action , 2010 .