An efficient cryptographic protocol verifier based on prolog rules

被引:563
作者
Blanchet, B [1 ]
机构
[1] Inst Natl Rech Informat & Automat, F-78153 Le Chesnay, France
来源
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS | 2001年
关键词
D O I
10.1109/CSFW.2001.930138
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present anew automatic cryptographic protocol verifier based on: a simple representation of the protocol by Prolog rules, and on a new efficient algorithm that determines whether a fact can be proved from these rules or not. This verifier proves secrecy properties of the protocols. Thanks to its use of unification, it avoids the problem of the state space explosion. Another advantage is that we do not need to limit the number of runs of the protocol, to analyze it We have proved the correctness of our algorithm, and have implemented it. The experimental results show that many examples of protocols of the literature, including Skeme [24], can be analyzed by our tool with very small resources: the analysis takes from less than 0.1 s for simple protocols to 23 s for the main mode of Skeme. It uses less than 2 Mb of memory in our tests.
引用
收藏
页码:82 / 96
页数:15
相关论文
共 37 条
[1]   Prudent engineering practice for cryptographic protocols [J].
Abadi, M ;
Needham, R .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1996, 22 (01) :6-15
[2]   Secrecy by typing in security protocols [J].
Abadi, M .
JOURNAL OF THE ACM, 1999, 46 (05) :749-786
[3]   Explicit communication revisited: Two new attacks on authentication protocols [J].
Abadi, M .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1997, 23 (03) :185-186
[4]  
Abadi M, 2000, NATO ADV SCI I F-COM, V175, P39
[5]  
ABADI M, 2001, LECT NOTES COMPUTER, V2030, P25
[6]  
ABADI M, 2001, 28 ACM S PRINC PROGR, P104
[7]  
[Anonymous], 1999, FMSP 99
[8]  
[Anonymous], P WORKSH FORM METH S
[9]  
[Anonymous], 1996, LNCS
[10]  
Bodei C, 1998, LECT NOTES COMPUT SC, V1466, P84, DOI 10.1007/BFb0055617