Abstract
We introduce an original method to verify probabilistic properties in cryptographic protocols. This method uses the representation of participants' knowledge that we presented at CRYPTO'91. The modelization is based on the assumption that the underlying cryptographic system is perfect and is an extension of the “Hidden Automorphism Model” introduced by Merritt.
This is a preview of subscription content, log in via an institution.
Preview
Unable to display preview. Download preview PDF.
References
M. Burrows, M. Abadi, and R. Needham. A Logic of Authentication. Technical Report 39, Digital — Systems Research Center (SRC), 1989.
P. Bieber. Aspects Epistémiques des Protocoles Cryptographiques. PhD thesis, Université Paul-Sabatier de Toulouse (Sciences), October 1989.
M. Blum and S. Micali. How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. SIAM Journal on Computing, 13(4):850–864, 1984.
R. Berger, R. Peralta, and T. Tedrick. A Provably Secure Oblivious Transfer Protocol. In T. Beth, N. Cot, and I. Ingemarsson, editors, Lecture Notes in Computer Science. Advances in Cryptology, Proceedings of EUROCRYPT'84 #209, pages 379–386. Springer-Verlag, 1985.
S. Goldwasser, S. Micali, and C. Rackoff. The Knowledge Complexity of Interactive Proof-Systems. SIAM Journal on Computing, 18(1):186–208, 1989.
L. Gong, R. Needham, and R. Yahalom. Reasoning about Belief in Cryptographic Protocols. In Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pages 234–248. IEEE Computer Society Press, 1990.
R. A. Kemmerer. Analyzing Encryption Protocols Using Formal Verification Techniques. IEEE Journal on Selected Areas in Communications, 7(4):448–457, 1989.
J. K. Millen, S. C. Clark, and S. B. Freedman. The Interrogator: Protocol Security Analysis. IEEE Transactions on Software Engineering, 13(2):274–288, 1987.
C. Meadows. Representing Partial Knowledge in an Algebraic Security Model. In Proceedings of the Computer Security Foundations Workshop III, pages 23–31. IEEE Computer Society Press, 1990.
M. J. Merritt. Cryptographic Protocols. PhD thesis, Georgia Institute of Technology 1983.
M. Merritt and P. Wolper. States of Knowledge in Cryptographic Protocols (extended abstract). Unpublished Manuscript, 1985.
P. Syverson. The Use of Logic in the Analysis of Cryptographic Protocols. In Proceedings of the 1991 IEEE Symposium on Research in Security and Privacy, pages 156–170. IEEE Computer Society Press, 1991.
A. Thayse, P. Gribomont, G. Hulin, A. Pirotte, D. Roelants, D. Snyers, M. Vauclair, P. Gochet, P. Wolper, E. Grégoire, and P. Delsarte. Approche logique de l'intelligence artificielle — 2. De la logique modale à la logique des bases de données. Dunod, Bordas, Paris, 1989.
M-J. Toussaint. Reasoning about Probabilistic Properties of Cryptographic Protocols (extended abstract). Abstract of the talk at the F.N.R.S. day on Computer Security, May 1989.
M-J. Toussaint. Deriving the Complete Knowledge of Participants in Cryptographic Protocols (Extended Abstract). in the proceedings of CRYPTO'91, August. 1991.
M.-J. Toussaint. Verification of Cryptographic Protocols. PhD thesis, Université de Liège (Belgium), 1991.
M-J. Toussaint and P. Wolper. Reasoning about Cryptographic Protocols (Extended Abstract). In Joan Feigenbaum and Michael Merritt, editors, Distributed Computing and Cryptography (October 1989), pages 245–262. DIMACS — Series in Discrete Mathematics and Theoretical Computer Science (AMS — ACM), 1991. Volume 2.
V. Varadharajan. Verification of Network Security Protocols. Computers & Security, 8(8):693–708, 1989.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1993 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Toussaint, MJ. (1993). Formal verification of probabilistic properties in cryptographic protocols. In: Imai, H., Rivest, R.L., Matsumoto, T. (eds) Advances in Cryptology — ASIACRYPT '91. ASIACRYPT 1991. Lecture Notes in Computer Science, vol 739. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57332-1_35
Download citation
DOI: https://doi.org/10.1007/3-540-57332-1_35
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-57332-6
Online ISBN: 978-3-540-48066-2
eBook Packages: Springer Book Archive