On the representation and verification of cryptographic protocols in a theory of action

Document
Contributors
Abstract
Proceedings of 2010 Eighth Annual International Conference on Privacy Security and Trust (PST) in Ottawa, ON, Canada, 17-19 Aug. 2010. Cryptographic protocols are usually specified in an informal, ad hoc language, with crucial elements, such as the protocol goal, left implicit. We suggest that this is one reason that such protocols are difficult to analyse, and are subject to subtle and nonintuitive attacks. We present an approach for formalising and analysing cryptographic protocols in a theory of action, specifically the situation calculus. Our thesis is that all aspects of a protocol must be explicitly specified. We provide a declarative specification of underlying assumptions and capabilities in the situation calculus. A protocol is translated into a sequence of actions to be executed by the principals, and a successful attack is an executable plan by an intruder that compromises the specified goal. Our prototype verification software takes a protocol specification, translates it into a high-level situation calculus (Golog) program, and outputs any attacks that can be found. We describe the structure and operation of our prototype software, and discuss performance issues.,Conference paper,Published.
Subject (Topical)

Refine your search

Note
Proceedings of 2010 Eighth Annual International Conference on Privacy Security and Trust (PST)
Identifier
ISBN: 9781424475506
doi: 10.1109/PST.2010.5593236
Publisher
IEEE
Type
Language
Rights
© 2010 IEEE