Browse > Article
http://dx.doi.org/10.13089/JKIISC.2003.13.1.115

An Experimental Study on the Semi-Automated Formal Verification of Cryptographic Protocols  

권태경 (세종대학교 컴퓨터공학부)
양숙현 (한국과학기술원 전자전산학과)
김승주 (한국정보보호진흥원)
임선간 (한국정보보호진흥원)
Abstract
This paper presents a semi-automated formal verification method based on the famous SVO logic, and discusses its experimental results. We discuss several problems on automating the SVO logic and design its derivative, ASVO logic for automation. Also the proposed method is implemented by the Isabelle/Isar system. As a result, we verified the well-known weakness of the NSSK protocol that is vulnerable to the Denning-Sacco attack, using our Isabelle/ASVO system. Finally, we refined the protocol by following the logical consequence of the ASVO verification.
Keywords
인증 프로토콜;프로토콜 분석;인증 로직;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 A unified cryptographic protocol logic /
[ P. Syverson;P. van Oorschot ] / NRL Publication 5540-227
2 Automated analysis of cryptographic protocols using MurΦ /
[ J. Mitchell;M. Mitchell;U. Stern ] / Proc. of the IEEE Symposium on Security and Privacy
3 Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification /
[ S. Gritzalis;D. Spinellis;P. Georgiadis ] / Computer Communications
4 Athena: a novel approach to efficient automatic security protocol analysis /
[ D. Song;S. Berezin;A. Perrig ] / Journal of Computer Security
5 Reasoning about belief in cryptographic protocols /
[ L. Gong;R. Needham;R. Yahalom ] / Proc. of the IEEE Symposium on Research in Security and Privacy
6 A logic of authentication /
[ M. Burrows;M. Abadi;R. Needham ] / Technical Report SRC RR 39, Digital Equipment Corporation, Systems Research Center
7 Formal methods in the design of cryptographic protocols /
[ L. Buttyan ] / EPFL SSC Technical Report No. SSC/1999/038
8 Entity authentication and key distribution /
[ M. Bellare;P. Rogaway ] / Advances in Cryptology - CRYPTO 93
9 Isabelle/HOL /
[ T. Nipkow;L. Paulson;M. Wenzel ] / Lecture Notes in Computer Science
10 On unifying some cryptographic protocol logics /
[ P. Syverson;P. van Oorschot ] / Proc. of the IEEE Symposium on Research in Security and Privacy
11 Evaluating and improving protocol analysis by automatic proof /
[ S. Brackin ] / Proc. of the IEEE Computer Security Foundation Workshop
12 /
[ J. Clark;J. Jacob ] / A survey of authentication protocol literature(version 1.0)
13 A HOL extension of GNY for automatically analyzing cryptographic protocols /
[ S. Brackin ] / Proc. of the IEEE Computer Security Foundation Workshop
14 A semantics for a logic of authentication /
[ M Abadi;M. Tuttle ] / Proc. of the Tenth Annual ACM Symposium on Principles of Distributed Computing
15 Modelling and verifying key-exchange protocols using CSP & FDR /
[ A. Roscoe ] / Proc. of the IEEE Computer Security Foundation Workshop
16 The logic of authentication protocols /
[ P. Syverson;Iliano Cervesato ] / Lecture Notes in Computer Science
17 An interface specification language for automatically analyzing cryptographic protocols /
[ S. Brackin ] / Proc. of the ISOC Network and Distributed System Security
18 /
[ V. Shoup ] / On Formal Models for Secure Key Exchange
19 Analyzing encryption protocols using formal verification techniques /
[ R. Kemmerer ] / IEEE Journal on Selected Areas in Communications   ScienceOn
20 Formal verification of cryptographic protocols: A survey /
[ C. Meadows ] / Advances in Cryptography - Asiacrypt 94
21 Extending cryptographic logics of belief to key agreement protocols /
[ P. van Oorschot ] / Proc. of the ACM Conference on Computer Communications Security
22 C3PO: a tool for automatic sound cryptographic protocol analysis /
[ A. Dekker ] / Proc. of the IEEE Computer Security Foundation Workshop
23 On the automation of GNY logic /
[ A. Mathuria;R. Safavi-Naini;P. Nickolas ] / Australian Computer Science Communications