Skip to main content

The Coinductive Approach to Verifying Cryptographic Protocols

  • Conference paper
Recent Trends in Algebraic Development Techniques (WADT 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2755))

Included in the following conference series:

Abstract

We look at a new way of specifying and verifying cryptographic protocols using the Coalgebraic Class Specification Language. Protocols are specified into CCSL (with temporal operators for ”free”) and translated by the CCSL compiler into theories for the theorem prover PVS. Within PVS, the desired security conditions can then be (dis)proved.

In addition, we are interested in using assumptions which are reflected in real-life networks. However, as a result, we present only a partial solution here. We have not proved full correctness of a protocol under such loose restrictions. This prompts discussion of what assumptions are acceptable in protocol verification, and when practical concerns may outweigh theoretical motivations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The spi calculus. In: Proceedings of the Fourth ACM Conference on Computer and Communications Security, April 1997, pp. 36–47. ACM Press, New York (1997)

    Google Scholar 

  2. Burrows, M., Abadi, M., Needham, R.: A logic of authentication. Proc. Royal Soc., Series A 426, 233–271 (1989)

    Article  MathSciNet  MATH  Google Scholar 

  3. Clark, J., Jacob, J.: A Survey of Authentication Protocol Literature, version 1.0 (1997), available at http://www-users.cs.york.ac.uk/~jac/papers/drareview.ps.gz

  4. Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory 29(6) (1983)

    Google Scholar 

  5. Lowe, G.: An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters 56, 131–133 (1995)

    Article  MATH  Google Scholar 

  6. Lowe, G.: Casper: A compiler for the analysis of security protocols. In: PCSFW: Proceedings of The 10th Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos (1997)

    Google Scholar 

  7. Millen, J., Shmatikov, V.: Constraint solving for bounded-process cryptographic protocol analysis. In: 8th ACM Conference on Computer and Communication Security, ACM SIGSAC, November 2001, pp. 166–175 (2001)

    Google Scholar 

  8. Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Communications of the ACM 21(12), 993–999 (1978)

    Article  MATH  Google Scholar 

  9. Owre, S., Rushby, J.M., Shankar, N., von Henke, F.: Formal verification for fault-tolerant architectures: Prolegomena to the design of PVS. IEEE Trans. on Softw. Eng. 21(2), 107–125 (1995)

    Article  Google Scholar 

  10. Paulson, L.C.: Isabelle. LNCS, vol. 828. Springer, Heidelberg (1994)

    Book  MATH  Google Scholar 

  11. Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journ. of Computer Security 6, 85–128 (1998)

    Article  Google Scholar 

  12. Rothe, J., Tews, H., Jacobs, B.: The coalgebraic class specification language CCSL. Journal of Universal Comp. Sci. 7(2) (2001)

    Google Scholar 

  13. Shanker, N., Owre, S., Rushby, J.M., Stringer-Calvert, D.: PVS prover guide, Version 2.3 (1999)

    Google Scholar 

  14. Tews, H.: Coalgebraic Methods for Object Oriented Specification. PhD thesis, Technical University of Dresden (October 2002)

    Google Scholar 

  15. Thayer, F.J., Herzog, J.C., Guttman, J.D.: Strand spaces: Proving security protocols correct. Journal of Computer Security 7(1) (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hughes, J., Warnier, M. (2003). The Coinductive Approach to Verifying Cryptographic Protocols. In: Wirsing, M., Pattinson, D., Hennicker, R. (eds) Recent Trends in Algebraic Development Techniques. WADT 2002. Lecture Notes in Computer Science, vol 2755. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-40020-2_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-40020-2_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20537-1

  • Online ISBN: 978-3-540-40020-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics