DOI QR코드

DOI QR Code

Automation-considered SVO Logic for Verifying Authentication and Key Distribution Protocols

인증 및 키 분배 프로토콜의 논리성 검증을 위한 ASVO 로직

  • Published : 2003.10.01

Abstract

This paper presents the ASVO (Automation-considered SVO) Logic that can be used for verifying authentication and key distribution protocols. The ASVO logic was designed for automatic verification, in a way to modify the SVO logic, one of the most famous authentication logics. The ASVO logic is syntactically and semantically sound, and requires relatively simple verification steps. Also we implemented the Isabelle/ASVO system which supports semi-automated verification, by using the Isabelle/Isar system.

본 논문에서는 인증 및 키 분배 프로토콜에 대한 논리성 검증을 위한 ASVO 로직을 제안한다. ASVO 로직은 기존의 인증 로직 중 하나인 SVO 로직에 대해서 자동 검증을 고려하여 변형 설계한 로직이다. ASVO 로직은 구문적/의미적 구조의 안전성을 갖는 로직으로서. 비교적 간소화된 증명 단계를 갖는다. 또한 Isabelle/Isar 시스템을 이용하여 구현된 Isabelle/ASVO 시스템은 ASVO 로직을 통한 반자동 검증을 지원한다.

Keywords

References

  1. Proc. of the Tenth Annual ACM Symposium on Principles of distributed Computing A semantics for a logic of authentication M Aadi;M.Tuttle
  2. Technical Report SRC PR 39 v.8 no.1 A logic of authentication M.Burrows;M.Abadi;R.Needham
  3. Proc. of the IEEE Coumputer Security Foundation Workshop C3PO: a tool for automatic sound cryptographic protocol analysis A.Dekker
  4. Communications of the ACM v.24 no.8 Timestamps in key distribution protocols D.Denning;G.Sacco https://doi.org/10.1145/358722.358740
  5. Proc. of the IEEE Symposium on Research in Security and Privacy Reasoning about belief in cryptographic protocols L.Gong;R.Needham;R.Yahalom
  6. Computer Communications v.22 no.8 Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification S.Grizalis;D.Spinellis;P.Georgiadis
  7. Software-Concepts and Tools v.17 Breaking and fixing the Needham-Schroeder public-ey protocol using FDR G.Lowe
  8. IEEE Computer Security Foundations Workshop Some new attacks upon security protocols G.Lowe
  9. Communications of the ACM v.21 no.12 Using encryption for authentication in large networks of computers R.Needhan;M.Schroeder https://doi.org/10.1145/359657.359659
  10. Lecture Notes in Computer Science v.2283 Isabelle/HOL T.Nipkow;L.Paulson;M.Wenzel
  11. Proc. of the IEEE Symposium on Research in Security and Privacy On unifying some cryptographic protocol logics P.Syverson;P. van OorschotSyt
  12. NRL Publication 5540~227, Naval Research Lab A unified cryptographic protocol logic P.Syverson;P. van Oorschot
  13. Leture Notes in computer Science v.2171 The logic of authentication protocols P.Syverson;Iliano Cervesato
  14. Proc. of the ACM Conference on Computer Communications Security Extending cryptographic logics of belief to key agreement protocols P. van Oorschot
  15. Mathematical Modal Logic: a view of its Evolution R.Goldblatt
  16. 한국정보보호학회 논문지 v.13 no.1 암호프로토콜 논리성 자동 검증에 관한 연구 권태경;양숙현;김승주;임선간
  17. WISA, Lecture Notes in Computer Science Automation considered Logic of Authentication and key distribution Taekyoung Kwon;Seongan Lim