Abstract
In this paper we give a survey of the state of the art in the application of formal methods to the analysis of cryptographic protocols. We attempt to outline some of the major threads of research in this area, and also to document some emerging trends. ...
Preview
Unable to display preview. Download preview PDF.
References
Martín Abadi and Mark Tuttle. A Semantics for a Logic of Authentication. In Proceedings of the Tenth ACM Symposium on Principles of Distributed Computing, pages 201–216. ACM Press, August 1991.
A. Aziz and W. Diffie. Privacy and Authentication for Wireless Local Area Networks. IEEE Personal Communications, 1(1):25–31, 1994.
M. Bellare and P. Rogaway. Entity Authentication and Key Distribution. In Advances in Cryptology — CRYPTO '93, volume to appear. Springer-Verlag, 1994.
P. Bieber. A Logic of Communication in a Hostile Environment. In Proceedings of the Computer Security Foundations Workshop III, pages 14–22. IEEE Computer Society Press, June 1990.
J. Burns and C. J. Mitchell. A Security Scheme for Resource Sharing Over a Network. Computers and Security, 19:67–76, February 1990.
Michael Burrows, Martín Abadi, and Roger Needham. A Logic of Authentication. ACM Transactions in Computer Systems, 8(1):18–36, February 1990.
Michael Burrows, Martín Abadi, and Roger Needham. Rejoinder to Nessett. Operating Systems Review, 24(2):39–40, April 1990.
U. Carlsen. Generating Formal Cryptographic Protocol Specifications. In Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, pages 137–146. IEEE Computer Society Press, May 16–18 1994.
CCITT. CCITT Draft Recomendation X.509. The Directory-Authentication Framework, Version 7, November 1987.
D. E. Denning and G. M. Sacco. Timestamps in Key Distribution Protocols. Communications of the ACM, 24(8):198–208, 1981.
Whitfield Diffie, Paul C. van Oorschot, and Michael J. Wiener. Authentication and Authenticated Key Exchanges. Designs, Codes, and Cryptography, 2:107–125, 1992.
D. Dolev, S. Even, and R. Karp. On the Security of Ping-Pong Protocols. Information and Control, pages 57–68, 1982.
D. Dolev and A. Yao. On the Security of Public Key Protocols. IEEE Transactions on Information Theory, 29(2):198–208, March 1983.
Shimon Even, Oded Goldreich, and Adi Shamir. On the Security of Ping-Pong Protocols When Implemented Using the RSA. In Hugh C. Williams, editor, Advances in Cryptology — CRYPTO '85, pages 58–72. Springer-Verlag, 1985.
Joan Feigenbaum. Overview of Interactive Proof Systems and Zero Knowledge. In G. J. Simmons, editor, Contemperary Cryptology: The Science of Information Integrity, chapter 8, pages 423–439. IEEE Press, 1991.
L. Gong, R. Needham, and R. Yahalom. Reasoning about belief in cryptographic protocols. In IEEE Computer Society Symposiun in Security and Privacy, pages 234–248. IEEE Computer Society Press, May 1990.
Nevin Heintze and J. D. Tygar. A Model for Secure Protocols and Their Compositions. In 1994 IEEE Computer Society Symposium on Research in Security and Privacy, pages 2–13. IEEE Computer Society Press, May 1994.
R. Kailar, V. D. Gligor, and L. Gong. On the Security Effectiveness of Cryptographic Protocols. In Proceedings of the Fourth Internation Working Conference on Dependable Computing For Critical Applications, 1994. to appear.
Richard Kemmerer. Using Formal Methods to Analyze Encryption Protocols. IEEE Journal on Selected Areas in Communication, 7(4):448–457, 1989.
Richard Kemmerer, Catherine Meadows, and Jonathan Millen. Three Systems for Cryptographic Protocol Analysis. Journal of Cryptology, 7(2), 1994.
T. M. A. Lomas, L. Gong, J. H. Saltzer, and R. H. Needham. Reducing Risks From Poorly Chosen Keys. Operating Systems Reviews, 23(5):14–18, 1989.
D. Longley and S. Rigby. An Automatic Search for Security Flaws in Key Management Schemes. Computers and Security, 11(1):75–90, 1992.
C. Meadows. Representing Partial Knowledge in an Algebraic Security Model. In Proceedings of the Computer Security Foundations Workshop III, pages 23–31. IEEE Computer Society Press, June 1990.
C. Meadows. A System for the Specification and Analysis of Key Management Protocols. In Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy, pages 182–195. IEEE Computer Society Press, Los Alamitos, California, 1991.
C. Meadows. Applying Formal Methods to the Analysis of a Key Management Protocol. Journal of Computer Security, 1:5–53, 1992.
C. Meadows. A Model of Computation for the NRL Protocol Analyzer. In Proceedings of the 7th Computer Security Foundations Workshop. IEEE Computer Society Press, June 1994.
M. J. Merritt. Cryptographic Protocols. Ph.d. thesis, Georgia Institute of Technology, 1983.
J. K. Millen, S. C. Clark, and S. B. Freedman. The Interrogator: Protocol Security Analysis. IEEE Transactions on Software Engineering, SE-13(2), 1987.
L. Moser. A Logic of Knowledge and Belief for Reasoning About Computer Security. In Proceedings of the Computer Security Foundations Workshop II, pages 57–63. IEEE Computer Society Press, June 1989.
R. M. Needham and M. D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, 21(12):993–999, December 1978.
D. M. Nessett. A Critique of the Burrows, Abadi, and Needham Logic. Operating Systems Review, 24(2):35–38, April 1990.
Birgit Pfitzmann. Sorting Out Signature Schemes. In Proceedings of the First ACM Conference on Computer and Communications Security, pages 74–85. ACM SIGSAC, ACM, November 3–5 1993.
G. B. Purdy, G. J. Simmons, and J. A. Studier. A Software Protection Scheme. In Proceedings of the 1982 Symposium on Security and Privacy, pages 99–103. IEEE Computer Society Press, April 1982.
P. V. Rangan. An Axiomatic Basis of Trust in Distributed Systems. In Proceedings of the 1988 Symposium on Security and Privacy, pages 204–211. IEEE Computer Society Press, April 1988.
G. J. Simmons. How to (Selectively) Broadcast a Secret. In Proceedings of the 1985 Symposium on Security and Privac, pages 108–113. IEEE Computer Society Press, April 1985.
S. Stubblebine and V. Gligor. On Message Integrity in Cryptographic Protocols. In Proceedings of the 1992 Symposium on Security and Privacy, pages 85–104. IEEE Computer Society Press, May 1992.
S. Stubblebine and V. Gligor. Protecting the Integrity of Privacy-Enhanced Mail. In PSRG Workshop on Network and Distributed System Security, pages 75–80, February 11–12 1993.
P. Syverson. Formal Semantics for Logics of Cryptographic Protocols. In Proceedings of the Computer Security Foundations Workshop III, pages 32–41. IEEE Computer Society Press, June 1990.
Paul Syverson. Adding Time to a Logic of Authentication. In Proceedings of the First ACM Conference on Computer and Communications Security, pages 97–101. ACM SIGSAC, ACM, November 3–5 1993.
Paul Syverson and Catherine Meadows. A Logical Language for Specifying Cryptographic Protocol Requirements. In Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, pages 165–177. IEEE Computer Society Press, Los Alamitos, California, 1993.
Paul Syverson and Catherine Meadows. Formal Requirements for Key Distribution Protocols. In Proceedings of Eurocrypt '94, 1994. to appear.
Paul F. Syverson. Knowledge, Belief, and Semantics in the Analysis of Cryptographic Protocols. Journal of Computer Security, 1(3):317–334, 1992.
Paul F. Syverson and Paul C. van Oorschot. On Unifying Some Cryptographic Protocol Logics. In 1994 IEEE Computer Society Symposium on Research in Security and Privacy, pages 14–28. IEEE Computer Society, May 1994.
M.-J. Toussaint. Verification of Cryptographic Protocols. Ph.d. thesis, Universite de Liege (Belgium), 1991.
M.-J. Toussaint. Deriving the Complete Knowledge of Participants in Cryptographic Protocols. In CRYPTO '91 (Advances in Cryptology— CRYPTO '91). Springer-Verlag, 1992.
M.-J. Toussaint. Separating the Specification and Implementation. Phases in Cryptology. In Computer Security — ESORICS 92, volume LMCS 638, pages 77–102. Springer-Verlag, 1992.
T. Y. C. Woo and S. Lam. A Semantic Model for Authentication Protocols. In Proceedings of the 1993 Symposium on Research in Security and Privacy, pages 178–194. IEEE Computer Society Press, May 1993.
R. Yahalom. Optimality of Asynchronous Two-Party Secure Data-Exchange Protocols. Journal of Computer Security, 2(2–3):191–209, 1994.
R. Yahalom, Birgit Klein, and Thomas Beth. Trust relationships in secure systems: A distributed authentication perspective. In Proceedings of the 1993 IEEE Symposium on Security and Privacy, pages 150–164. IEEE Computer Society Press, May 1993.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1995 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Meadows, C.A., Meadows, C.A. (1995). Formal verification of cryptographic protocols: A survey. In: Pieprzyk, J., Safavi-Naini, R. (eds) Advances in Cryptology — ASIACRYPT'94. ASIACRYPT 1994. Lecture Notes in Computer Science, vol 917. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0000430
Download citation
DOI: https://doi.org/10.1007/BFb0000430
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-59339-3
Online ISBN: 978-3-540-49236-8
eBook Packages: Springer Book Archive