Browse > Article

Towards Developing Formal Verification Tools for Cryptographic Protocols  

권태경 (세종대학교 소프트웨어 공학과)
김승주 (한국정보보호진흥원)
송보연 (한국정보보호진흥원)
Abstract
Incautiously designed and informally verified cryptographic protocols are error-prone and can allow an adversary to have the ideal starting point for various kinds of attacks. The flaws resulting from these protocols can be subtle and hard to find. Accordingly we need formal methods for systematic design and verification of cryptographic protocols. This paper surveys the state-of-the-art and proposes a practical developing method that will be implemented in the future study.
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 A semantics for a logic of authentication /
[ M. Abadi;M. Tuttle ] / In Proc. of the Tenth Annual ACM Symposium on Principles of Distributed Computing
2 A critique of the Burrows Abadi and Needham logic /
[ D.Nessett ] / Operating Systems Review   DOI
3 A logic of composition for information flow predicates /
[ R.Peri;W.Wulf;D.Kienzle ] / In Proc. of the IEEE Computer Security foundation Workshop
4 Extending cryptographic ligics of belief to key agreement protocols /
[ P.van Oorschot ] / In Proc. of the ACM Conference on Computer Communications Security
5 Entity authentication and key distribution /
[ M. Bellare;P.Rogaway ] / In Advance in Cryptology-CRYPTO 93
6 On the security oj public key protocols /
[ D.Dolev;A.Yao ] / IEEE Transactions on Information Theory   DOI
7 Strand spaces : Why is a security protocol correct? /
[ F.Fabrega;J.Herzog;J.Guttman ] / In Proc. of the IEEE Symposium on Research in Security and Provacy
8 Formal verification of cryptography protocols : A survey /
[ C.Meadows ] / In Advances in Cryptography - Asiacrypt 94
9 /
[ J.Clark;J.Jacob ] / A survey of authentication porotocol literature: version 1.0
10 Formal methods for the analysis of authentication protocols /
[ A.Rubin;P.Honeyman ] / Technical Report CITI TR 93-7
11 /
[ C.V.Ramamoorthy ] / Personal Communicaitons
12 Analysis of the Internet Key Exchange protocol using NRL Protocol Analyzer /
[ C.Meadows ] / In Proc. of the IEEE symposium on Security and Privacy
13 Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification /
[ S.Gritzalis;D.Spinellis;P.Georgiadis ] / Computer Communications
14 A calculus for crytopraphic protocols : The Spicalculus /
[ M.Abadi;A.Gordon ] / Technical Report SRC RR149
15 A HOL extension of GNY for automatically analyzing cryptographic protocols /
[ S.Brackin ] / In Proc. of the IEEE Computer Security Foundation Workshop
16 Analyzing encryption protocols using formal verification technique /
[ R.Kemmerer ] / IEEE Journal on Selected Areas in Communications   DOI   ScienceOn
17 Honest ideals on strand spaces /
[ F.Fabrega;J.Herzog;J.Guttman ] / In Proc. of the IEEE Computer Security Foundation Workshop
18 Athena:a novel approach to efficient automatic security protocol analysis /
[ D.Song;S.Berezin;A.Perrig ] / In Journal of Computer Security   DOI
19 Evaluating and improving protocol analysis by automatic proof /
[ S.Brackin ] / In Proc. of the IEEE Conputer Security Foundation Workshop
20 On a limitation of BAN logic /
[ C.Boyd;W.Mao ] / In Advances in Cryptology - Eurocrypt 93
21 A modular approach to the design and analysis of authentication and key exchange protocols /
[ M.Bellare;R.Canetti;H.Krawczyk ] / In ACM Symposium on Theory of computing
22 The Interrogator : Protocol security analysis /
[ J.Millen;S.Clark;S.Freedman ] / IEEE Transactions on Software Engiveering   DOI   ScienceOn
23 Key agreement protocols and their security analysis /
[ S.Blake-Wilson;D.Johnson;A.Menesez ] / In Sixth IMA International Comference on Cryptography and Coding
24 Automated analysis of cryptographic protocols using Mur /
[ J.Mitchell;M.Mitchell;U.Stern ] / In Proc. of the IEEE Symposium on Security and Privacy
25 Applying formal methods to the analysis of a key management protocol /
[ C.Meadows ] / Journal of Computer Security   DOI
26 A system for the specification and analysis of key management protocols /
[ C.Meadows ] / In Proc. of the IEEE Symposium on Research in Security and Privacy
27 A logic of communication in a hostile environment /
[ P.Bieber ] / In Proc. of the IEEE Computer Security Foundation Workshop
28 Formal semantics for logics of cryptographic protocols /
[ P.Syverson ] / In Proc. of the IEEE Symposium on Research in Security and Privacy
29 Formal method in the disign fo cryptographic protocols /
[ L.Buttyan ] / EPFL SSC Technical Report No. SSC/1999/038
30 A CAPSL interface for the NRL Protocol Analyzer /
[ S.Brackin;C.Meadow;J.Millen ] / In Proc. of IEEE ASSET 99
31 On unifying some cryptographic protocol logics /
[ P.syverson;P.van Oorschot ] / In Proc. of the IEEE Symposium on Research in Security and Privacy
32 On the automation of GNY logic /
[ A.Mathuria;R.Safavi-Naini;P.Nicholas ] / Australian Computer Science Sommunications
33 On Formal Models for Sucure Key Exchange /
[ V.Shoup ] / IBM Zurich Research Lab.
34 Use of a formal description technique in the specification of authentication protocols /
[ V.Varadgarajan ] / Computer Standards and Interfaces
35 Reasoning about belief in cryptographic protocols /
[ L.Gong;R.Needham;R.Yahalom ] / In Proc. of the IEEE Symposium on Research in Sucurity and Privacy
36 A logic of authentication /
[ M.Burrows;M.Abadi;R.Needham ] / Technicla Report SRC RR 39
37 An interface specification language for automatically analyzing cryptographic protocol /
[ S.Brackin ] / In Proc. of the ISOC Network and Distributed System Security
38 C3PO: a tool for automatic sound cryptographic protocol analysis /
[ A.Dekker ] / In Proc. of the IEEE Computer Scurity Foundation Workshop
39 New directions on Information theory /
[ W.Diffie;M.Hellman ] / IEEE Transactions on Information theory   DOI
40 Verification of network security protocols /
[ V.Varadgarajan ] / Computers and Security   DOI   ScienceOn
41 Modelling and verifying key-exchange protocols using CSP & FDR /
[ A.Roscoe ] / In Proc. of the IEEE Computer Security Foundation Workshop