Proving Group Protocols Secure Against Eavesdroppers
Steve Kremer, Antoine Mercier, and Ralf Treinen. Proving Group Protocols Secure Against Eavesdroppers. In Proceedings of the 4th International Joint Conference on Automated Reasoning (IJCAR'08), pp. 116–131, Lecture Notes in Artificial Intelligence 5195, Springer-Verlag, Sydney, Australia, August 2008.
doi:10.1007/978-3-540-71070-7_9
Download
[PDF] [PDF (long version)] [HTML]
Abstract
Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate automated verification of a particular type of security protocols, called group protocols, in the presence of an eavesdropper, i.e., a passive attacker. The specificity of group protocols is that the number of participants is not bounded.
Our approach consists in representing an infinite set of messages exchanged during an unbounded number of sessions, one session for each possible number of participants, as well as the infinite set of associated secrets. We use so-called visibly tree automata with memory and structural constraints (introduced recently by Comon-Lundh et al.) to represent over-approximations of these two sets. We identify restrictions on the specification of protocols which allow us to reduce the attacker capabilities guaranteeing that the above mentioned class of automata is closed under the application of the remaining attacker rules. The class of protocols respecting these restrictions is large enough to cover several existing protocols, such as the GDH family, GKE, and others.
BibTeX
@inproceedings{KMT-ijcar08, abstract = {Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate automated verification of a particular type of security protocols, called \emph{group protocols}, in the presence of an eavesdropper, i.e., a passive attacker. The specificity of group protocols is that the number of participants is not bounded.\par Our approach consists in representing an infinite set of messages exchanged during an unbounded number of sessions, one session for each possible number of participants, as well as the infinite set of associated secrets. We use so-called visibly tree automata with memory and structural constraints (introduced recently by Comon-Lundh \textit{et~al.}) to represent over-approximations of these two sets. We~identify restrictions on the specification of protocols which allow us to reduce the attacker capabilities guaranteeing that the above mentioned class of automata is closed under the application of the remaining attacker rules. The class of protocols respecting these restrictions is large enough to cover several existing protocols, such as the GDH family, GKE, and others.}, address = {Sydney, Australia}, author = {Kremer, Steve and Mercier, Antoine and Treinen, Ralf}, booktitle = {{P}roceedings of the 4th {I}nternational {J}oint {C}onference on {A}utomated {R}easoning ({IJCAR}'08)}, DOI = {10.1007/978-3-540-71070-7_9}, editor = {Armando, Alessandro and Baumgartner, Peter and Dowek, Gilles}, month = aug, pages = {116-131}, publisher = {Springer-Verlag}, series = {Lecture Notes in Artificial Intelligence}, title = {Proving Group Protocols Secure Against Eavesdroppers}, volume = {5195}, year = {2008}, acceptrate = {26/80}, acronym = {{IJCAR}'08}, nmonth = {8}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/KMT-ijcar08.pdf}, }