Abstract
The correctness of an authentication protocol is based on, among others, the relation between nonces and data that is established in the course of execution of the protocol. In this paper, we formulate an inference system that derives the secrecy of nonces and the relation that binds nonces and data. It is easy to show the correctness of a protocol by directly deriving the binding relation using the inference rules. Depending on situations, it is also possible to extend the inference system by simply adding new inference rules. We give some example protocols whose correctness can only be shown using some conditions on nonces that are formulated as additional inference rules.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Rafael Accorsi, David Basin, Luca Viganò. Towards an Awareness-Based Semantics for Security Protocol Analysis. Proceedings of the First Workshop on Logical Aspects of Cryptographic Protocol Verification, 2001, pp. 9–27.
Michael Burrows, Martín Abadi and Roger Needham. A Logic of Authentication. Proceedings of the Royal Society of London, Vol.426, 1989, pp. 233–271.
Iliano Cervesato, Nancy A. Durgin, Patrick D. Lincoln, John C. Mitchell and Andre Scedrov. Relating Strands and Multiset Rewriting for Security Protocol Analysis. 13th IEEE Computer Security Foundation Workshop, 2000, pp. 35–51.
Ernie Cohen. TAPS: A First-Order Verifier for Cryptographic Protocols. 13th IEEE Computer Security Foundation Workshop, 2000, pp. 144–158.
Joshua D. Guttman and F. Javier Thayer Fábrega. Authentication Tests, Proceedings, 2000 IEEE Symposium on Security and Privacy, 2000, pp. 96–109.
Joshua D. Guttman. Security Protocol Design via Authentication Tests, 15th IEEE Computer Security Foundations Workshop, 2002, pp. 92–103.
Masami Hagiya, Yozo Toda and Yoshiki Fukuba. Implementation and Verification of Authentication Protocols Using Proof Procedures in HOL, 2nd SSR Enterprise Security Workshop, Information Media Center, Science University of Tokyo, Nov 1999, http://nicosia.is.s.u-tokyo.ac.jp/pub/staff/hagiya/ssr99/protveri.ps
Gavin Lowe. Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR. In T. Margaria and B. Steffen, editors, Tools and Algorithms for the Construction and analysis of Systems. Second International Workshop, TACAS’ 96, Lecture Notes in Computer Science, Vol.1055, 1996, pp. 147–166.
J. Millen and V. Shmatikov. Constraint solving for bounded-process cryptographic protocol analysis. 8th ACM Conference on Computer and Communication Security, pp. 166–175, 2001.
John C. Mitchell, Mark Mitchell and Ulrich Stern. Automated Analysis of Cryptographic Protocols Using Murφ. Proceedings of 1997 IEEE Symposium Security and Privacy, 1997, pp. 141–151.
Lawrence C. Paulson. Proving Properties of Security Protocols by Induction. 10th Computer Security Foundations Workshop, June 1997.
Lawrence C. Paulson. Mechanized Proofs of Security Protocols: Needham-Schroeder with Public Keys. Technical Report 413, Computer Laboratory, University of Cambridge, Jan. 1997.
Lawrence C. Paulson. Isabelle: A Generic Theorem Prover. Lecture Notes in Computer Science, Vol.828, Springer, 1994.
Adrian Perrig and Dawn Song. A First Step on Automatic Protocol Generation of Security Protocols. Proceedings of Network and Distributed System Security, February 2000.
Takamichi Saito, Masami Hagiya and Fumio Mizoguchi. On Authentication Protocols Using Public-key Cryptography, IPSJ Journal, Information Processing Society of Japan, Vol.42, No.8, pp. 2040–2048 (in Japanese).
Dawn Xiaodong Song. Athena: a New Efficient Automatic Checker for Security Protocol Analysis, Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999, pp. 192–202.
F. Javier Thayer Fábrega, Jonathan C. Herzog and Joshua D. Guttman. Strand spaces: Why is a Security Protocol Correct? Proceedings of 1998 IEEE Symposium on Security and Privacy, 1998, pp. 160–171.
F. Javier Thayer Fábrega, Jonathan C. Herzog and Joshua D. Guttman. Honest Ideas on Strand Spaces. Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998, pp. 66–77.
F. Javier Thayer Fábrega, Jonathan C. Herzog and Joshua D. Guttman. Strand Spaces: Proving Security Protocols Correct, Journal of Computer Security, Vol.7, 1999, pp. 191–230.
F. Javier Thayer Fábrega, Jonathan C. Herzog and Joshua D. Guttman. Mixed Strand Spaces. Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999, pp. 72–82.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hagiya, M., Takemura, R., Takahashi, K., Saito, T. (2003). Verification of Authentication Protocols Based on the Binding Relation. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds) Software Security — Theories and Systems. ISSS 2002. Lecture Notes in Computer Science, vol 2609. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36532-X_19
Download citation
DOI: https://doi.org/10.1007/3-540-36532-X_19
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00708-1
Online ISBN: 978-3-540-36532-7
eBook Packages: Springer Book Archive