Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Open access

A game-theoretic framework for specification and verification of cryptographic protocols

Published: 01 September 2010 Publication History

Abstract

We model security protocols as games using concepts of game semantics. Using this model we ascribe semantics to protocols written in the standard simple arrow notation. According to the semantics, a protocol is interpreted as a set of strategies over a game tree that represents the type of the protocol. The model uses abstract computation functions and message frames in order to model internal computations and knowledge of agents and the intruder. Moreover, in order to specify properties of the model, a logic that deals with games and strategies is developed. A tableau-based proof system is given for the logic, which can serve as a basis for a model checking algorithm. This approach allows us to model a wide range of security protocol types and verify different properties instead of using a variety of methods as is currently the practice. Furthermore, the analyzed protocols are specified using only the simple arrow notation heavily used by protocol designers and by practitioners.

References

References

[1]
Abadi M Bauer FL and Steinbrueggen R Security protocols and their properties Foundations of secure computation, 20th Int. Summer School, Marktoberdorf, Germany 2000 Amsterdam IOS Press 39-60
[2]
Abramsky S Dybjer P and Pitts A Semantics of interaction: an introduction to game semantics Proceedings of the 1996 CLiCS Summer School, Isaac Newton Institute 1997 Cambridge Cambridge University Press
[3]
Abadi M, Cortier V (2005) Deciding knowledge in security protocols under (many more) equational theories. In: Proceedings of the 18th IEEE Computer Security Foundations Workshop
[4]
Adi K, Debbabi M, and Mejri M A new logic for electronic commerce protocols Theor Comput Sci 2003 291 3 223-283
[5]
Abadi M, Fournet C (2001) Mobile values, new names, and secure communication. In: POPL, pp 104–115
[6]
Abadi M, Gordon A (1997) A calculus for cryptographic protocols: the SPI calculus. In: Proceedings of the 4th ACM conference on computer and communications security
[7]
Alur R, Henzinger T, Kupferman O (2002) Alternating-time temporal logic. JACM: J ACM, 49
[8]
Abramsky S, Malacaria P, Jagadeesan R (1994) Full abstraction for PCF. In: Theoretical Aspects of Computer Software, pp 1–15
[9]
Abadi M and Rogaway P Reconciling two views of cryptography (The computational soundeness of formal encryption) J Cryptol 2002 15 2 103-127
[10]
Blanchet B, Abadi M, Fournet C (2005) Automated verification of selected equivalences for security protocols. In: LICS, pp 331–340. IEEE Computer Society, New York
[11]
Burrows M, Abadi M, Needham R (1989) A logic of authentication. Technical report, Digital Systems Research Center
[12]
Boreale M, Buscemi M (2005) A method for symbolic analysis of security protocols. TCS: Theoretical Computer Science, vol 338
[13]
Blass A A game semantics for linear logic Ann Pure Appl Logic 1992 56 183-220
[14]
Cervesato I, Durgin N, Lincoln P, Mitchell J, Scedrov A (1999) A meta-notation for protocol analysis. In: CSFW: Proceedings of The 12th Computer Security Foundations Workshop. IEEE Computer Society Press, New York
[15]
Clarke E, Jha S, Marrero W (1998) Using state space exploration and a natural deduction style message derivation engine to verify security protocols. In: International Conference on Programming Concepts and Methods, pp 87–106
[16]
Chadha R, kremer S, and Scedrov A Formal analysis of multiparty contract signing J Autom Reason 2006 36 39-83
[17]
Cleaveland R Tableau-based model checking in the propositional mu-calculus Acta Inform 1990 27 8 725-748
[18]
Delaune S (2006) Vérification des protocoles cryptographiques et propriétés algébriques. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France
[19]
Dolev D and Yao A On the security of public key protocols IEEE Trans Inform Theory 1983 29 2 198-208
[20]
Hyland JME and Ong C-HL On full abstraction for PCF: I, II, III Info Comp 2000 163 285-408
[21]
Jürjens J (2002) Games in the semantics of programming languages. Synthese (Elsevier) 133(1–2), October/November 2002
[22]
Kremer S, Raskin J (2000) A game approach to the verification of exchange protocols—application to non-repudiation protocols. In: Proceedings of the workshop on issues in the theory of security (WITS ’00), 2000
[23]
Lorenz K (2001) Basic objectives of dialogue logic in historical perspective. Synthese (Elsevier), 127(1–2), April/May
[24]
Lowe G Breaking and fixing the Needham–Schroeder public-key protocol using FDR Software—concepts and tools 1996 17 3 93-102
[25]
Lowe G (1997) A hierarchy of authentication specification. In: CSFW, pp 31–44. IEEE Computer Society, New York
[26]
Needham R, Schroeder M (1978) Using encryption for authentication in large networks of computers. Commun ACM 21(12)
[27]
Paulson LC (1998) The inductive approach to verifying cryptographic protocols. J Comp Secur 85–128 (1998)
[28]
Rivest RL, Shamir A, Adleman L (1978) Mental poker. Technical report TM-125, MIT, Nov
[29]
Schneier B Applied cryptography 2001 2 New York Wiley
[30]
Tucker JV and Zucker JI Abramsky S, Gabbay D, and Maibaum T Computable functions and semicomputable sets on many-sorted algebras Handbook of logic in computer science, vol 5 2000 Oxford Oxford University Press 317-523
[31]
Woo TYC, Lam SS (1994) A lesson on authentication protocol design. Oper Syst Rev 24–37

Cited By

View all
  • (2013)Security Games for Cyber-Physical SystemsProceedings of the 18th Nordic Conference on Secure IT Systems - Volume 820810.1007/978-3-642-41488-6_2(17-32)Online publication date: 18-Oct-2013

Index Terms

  1. A game-theoretic framework for specification and verification of cryptographic protocols
                Index terms have been assigned to the content through auto-classification.

                Recommendations

                Comments

                Information & Contributors

                Information

                Published In

                cover image Formal Aspects of Computing
                Formal Aspects of Computing  Volume 22, Issue 5
                Sep 2010
                171 pages
                ISSN:0934-5043
                EISSN:1433-299X
                Issue’s Table of Contents

                Publisher

                Springer-Verlag

                Berlin, Heidelberg

                Publication History

                Published: 01 September 2010
                Accepted: 29 September 2009
                Received: 10 September 2007
                Published in FAC Volume 22, Issue 5

                Author Tags

                1. Security protocols
                2. Game semantics
                3. Formal verification
                4. Model checking

                Qualifiers

                • Research-article

                Contributors

                Other Metrics

                Bibliometrics & Citations

                Bibliometrics

                Article Metrics

                • Downloads (Last 12 months)39
                • Downloads (Last 6 weeks)7
                Reflects downloads up to 01 Feb 2025

                Other Metrics

                Citations

                Cited By

                View all
                • (2013)Security Games for Cyber-Physical SystemsProceedings of the 18th Nordic Conference on Secure IT Systems - Volume 820810.1007/978-3-642-41488-6_2(17-32)Online publication date: 18-Oct-2013

                View Options

                View options

                PDF

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader

                Login options

                Full Access

                Figures

                Tables

                Media

                Share

                Share

                Share this Publication link

                Share on social media