Verifying security protocols by knowledge analysis

Ma, X ORCID logoORCID: https://orcid.org/0000-0003-0074-4192 and Cheng, X, 2008. Verifying security protocols by knowledge analysis. International Journal of Security and Networks, 3 (3), pp. 183-192.

[thumbnail of 200281_6672 Ma Postprint.pdf]
Preview
Text
200281_6672 Ma Postprint.pdf

Download (227kB) | Preview

Abstract

This paper describes a new interactive method to analyse knowledge of participants involved in security protocols and further to verify the correctness of the protocols. The method can detect attacks and flaws involving interleaving sessions besides normal attacks. The implementation of the method in a generic theorem proving environment, namely Isabelle, makes the verification of protocols mechanical and efficient; it can verify a medium-sized security protocol in less than ten seconds. As an example, the paper finds the flaw in the Needham-Schroeder public key authentication protocol and proves the secure properties and guarantees of the protocol with Lowe's fix to show the effectiveness of this method.

Item Type: Journal article
Publication Title: International Journal of Security and Networks
Creators: Ma, X. and Cheng, X.
Publisher: Inderscience
Date: 2008
Volume: 3
Number: 3
Identifiers:
Number
Type
10.1504/IJSN.2008.020092
DOI
Rights: Copyright © 2008 Inderscience Enterprises Limited. All rights reserved.
Divisions: Schools > School of Science and Technology
Record created by: EPrints Services
Date Added: 09 Oct 2015 10:10
Last Modified: 09 Jun 2017 13:21
URI: https://irep.ntu.ac.uk/id/eprint/8788

Actions (login required)

Edit View Edit View

Statistics

Views

Views per month over past year

Downloads

Downloads per month over past year