A compiler for analyzing cryptographic protocols using noninterference
- 1 October 2000
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Software Engineering and Methodology
- Vol. 9 (4) , 488-528
- https://doi.org/10.1145/363516.363532
Abstract
The Security Process Algebra (SPA) is a CCS-like specification languag e where actions belong to two different levels of confidentiality. It has been used to define several noninterference-like security properties whose verification has been automated by the tool CoSeC. In recent years, a method for analyzing security protocols using SPA and CoSeC has been developed. Even if it has been useful in analyzing small security protocols, this method has shown to be error-prone, as it requires the protocol description and its environment to be written by hand. This problem has been solved by defining a protocol specification language more abstract than SPA, called VSP, and a compiler CVS that automatically generates the SPA specification for a given protocol described in VSP. The VSP/CVS technology is very powerful, and its usefulness is shown with some case studies: the Woo-Lam one-way authentication protocol, for which a new attack to authentication is found, and the Wide Mouthed Frog protocol, where different kinds of attack are detected and analyzed.Keywords
This publication has 21 references indexed in Scilit:
- Using CSP to detect errors in the TMN protocolIEEE Transactions on Software Engineering, 1997
- The Compositional Security Checker: a tool for the verification of information flow security propertiesIEEE Transactions on Software Engineering, 1997
- The NRL Protocol Analyzer: An OverviewThe Journal of Logic Programming, 1996
- Prudent engineering practice for cryptographic protocolsIEEE Transactions on Software Engineering, 1996
- A lesson on authentication protocol designACM SIGOPS Operating Systems Review, 1994
- Integrating security in a large distributed systemACM Transactions on Computer Systems, 1989
- Efficient and timely mutual authenticationACM SIGOPS Operating Systems Review, 1987
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- Formal verification of parallel programsCommunications of the ACM, 1976