Skip to main content
Top

2017 | OriginalPaper | Chapter

A Supporting Environment for Formal Analysis of Cryptographic Protocols

Authors : Jingchen Yan, Kazunori Wagatsuma, Hongbiao Gao, Jingde Cheng

Published in: Advanced Multimedia and Ubiquitous Engineering

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Formal analysis of cryptographic protocols is to find out flaws in the protocols by various formal methods. Some supporting tools for formal analysis of cryptographic protocols have been proposed and applied, but the tools failed to support the whole processes of formal analysis automatically. Therefore, a supporting environment which can support formal analysis automatically is needed for analysts. This paper presents the first supporting environment for formal analysis of cryptographic protocols.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Avalle, M., Alfredo, P., Riccardo, S.: Formal verification of security protocol implementations: a survey. Formal Aspects Comput. 26(1), 99 (2014)CrossRef Avalle, M., Alfredo, P., Riccardo, S.: Formal verification of security protocol implementations: a survey. Formal Aspects Comput. 26(1), 99 (2014)CrossRef
2.
go back to reference Bau, J., Mitchell, J.C.: Security modeling and analysis. IEEE Secur. Priv. 9(3), 18–25 (2011)CrossRef Bau, J., Mitchell, J.C.: Security modeling and analysis. IEEE Secur. Priv. 9(3), 18–25 (2011)CrossRef
3.
go back to reference Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, pp. 82–96. IEEE, (2001) Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, pp. 82–96. IEEE, (2001)
4.
go back to reference Blanchet, B., Smyth, B., Cheval, V.: ProVerif 1.96: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial (2016) Blanchet, B., Smyth, B., Cheval, V.: ProVerif 1.96: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial (2016)
5.
go back to reference Meadows, C.A.: Formal verification of cryptographic protocols: a survey. In: International Conference on the Theory and Application of Cryptology. Springer, Heidelberg (1994) Meadows, C.A.: Formal verification of cryptographic protocols: a survey. In: International Conference on the Theory and Application of Cryptology. Springer, Heidelberg (1994)
6.
go back to reference Meadows, C.A.: Formal methods for cryptographic protocol analysis: emerging issues and trends. IEEE J. Sel. Areas Commun. 21(1), 44–54 (2003)CrossRef Meadows, C.A.: Formal methods for cryptographic protocol analysis: emerging issues and trends. IEEE J. Sel. Areas Commun. 21(1), 44–54 (2003)CrossRef
7.
go back to reference Cheng, J., Miura, J.: Deontic relevant logic as the logical basis for specifying, verifying, and reasoning about information security and information assurance. In: Proceedings of the 1st International Conference on Availability, Reliability, and Security, pp. 601–608. IEEE-CS (2006) Cheng, J., Miura, J.: Deontic relevant logic as the logical basis for specifying, verifying, and reasoning about information security and information assurance. In: Proceedings of the 1st International Conference on Availability, Reliability, and Security, pp. 601–608. IEEE-CS (2006)
8.
go back to reference Cheng, J., Nara, S., Goto, Y.: FreeEnCal: a forward reasoning engine with general-purpose. In: Proceedings of the 11th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, Lecture Notes in Artificial Intelligence, vol. 4693, pp. 444–452. Springer-Verlag, Heidelberg (2007) Cheng, J., Nara, S., Goto, Y.: FreeEnCal: a forward reasoning engine with general-purpose. In: Proceedings of the 11th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, Lecture Notes in Artificial Intelligence, vol. 4693, pp. 444–452. Springer-Verlag, Heidelberg (2007)
9.
go back to reference Clarke, E.M., Grumberg, O., Peled, D.: Model Checking. MIT Press, Cambridge (1999) Clarke, E.M., Grumberg, O., Peled, D.: Model Checking. MIT Press, Cambridge (1999)
10.
go back to reference Cortier, V., Steve, K., Bogdan, W.: A survey of symbolic methods in computational analysis of cryptographic systems. J. Autom. Reasoning 46(3–4), 225–259 (2011)MathSciNetCrossRefMATH Cortier, V., Steve, K., Bogdan, W.: A survey of symbolic methods in computational analysis of cryptographic systems. J. Autom. Reasoning 46(3–4), 225–259 (2011)MathSciNetCrossRefMATH
11.
go back to reference Cremers, C.: On the protocol composition logic PCL. In: Proceedings of the 2008 ACM Symposium on Information, Computer, and Communications Security, pp. 66–76. ACM (2008) Cremers, C.: On the protocol composition logic PCL. In: Proceedings of the 2008 ACM Symposium on Information, Computer, and Communications Security, pp. 66–76. ACM (2008)
12.
13.
go back to reference Futatsugi, K., Diaconescu, R.: CafeOBJ report. World Scientific (1998) Futatsugi, K., Diaconescu, R.: CafeOBJ report. World Scientific (1998)
14.
go back to reference Heidorn, G.E.: Automatic programming through natural language dialogue: a survey. In: Readings in Artificial Intelligence and Software Engineering, pp. 203–214 (1986) Heidorn, G.E.: Automatic programming through natural language dialogue: a survey. In: Readings in Artificial Intelligence and Software Engineering, pp. 203–214 (1986)
15.
go back to reference Paulson, C.: The inductive approach to verifying cryptographic protocols. J. Comput. Secur. 6, 85–128 (1998)CrossRef Paulson, C.: The inductive approach to verifying cryptographic protocols. J. Comput. Secur. 6, 85–128 (1998)CrossRef
16.
go back to reference Wagatsuma, K., Shogo, A., Goto, Y., Cheng, J.: Formalization for formal analysis of cryptographic protocols with reasoning approach, In: Future Information Technology, Lecture Notes in Electrical Engineering, vol. 309, pp. 211–218. Springer, Heidelberg (2014) Wagatsuma, K., Shogo, A., Goto, Y., Cheng, J.: Formalization for formal analysis of cryptographic protocols with reasoning approach, In: Future Information Technology, Lecture Notes in Electrical Engineering, vol. 309, pp. 211–218. Springer, Heidelberg (2014)
17.
go back to reference Wagatsuma, K., Harada, T., Anze, S., Goto, Y., Cheng J.: A supporting tool for spiral model of cryptographic protocol design with reasoning-based formal analysis, In: Advanced Multimedia and Ubiquitous Engineering - Future Information Technology, LNEE, vol. 354, pp. 25–32. Springer, Heidelberg (2015) Wagatsuma, K., Harada, T., Anze, S., Goto, Y., Cheng J.: A supporting tool for spiral model of cryptographic protocol design with reasoning-based formal analysis, In: Advanced Multimedia and Ubiquitous Engineering - Future Information Technology, LNEE, vol. 354, pp. 25–32. Springer, Heidelberg (2015)
18.
go back to reference Yan, J., Wagatsuma, K., Gao, H., Cheng, J.: A formal analysis method with reasoning for cryptographic protocols. In: Proceedings of the 12th International Conference on Computational Intelligence and Security, pp. 566–570. IEEE Computer Society (2016) Yan, J., Wagatsuma, K., Gao, H., Cheng, J.: A formal analysis method with reasoning for cryptographic protocols. In: Proceedings of the 12th International Conference on Computational Intelligence and Security, pp. 566–570. IEEE Computer Society (2016)
Metadata
Title
A Supporting Environment for Formal Analysis of Cryptographic Protocols
Authors
Jingchen Yan
Kazunori Wagatsuma
Hongbiao Gao
Jingde Cheng
Copyright Year
2017
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-5041-1_87

Premium Partner