Skip to main content

Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets

  • Conference paper
Applications and Theory of Petri Nets (PETRI NETS 2008)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5062))

Included in the following conference series:

Abstract

In this paper, we introduce a framework composed of a syntax and its compositional Petri net semantics, for the specification and verification of properties (like authentication) of security protocols. The protocol agents (e.g., an initiator, a responder, a server, a trusted third party, ...) are formalized as roles, each of them having a predefined behavior depending on their global and also local knowledge (including for instance public, private and shared keys), and may interact in a potentially hostile environment.

The main characteristics of our framework, is that it makes explicit, structured and formal, the usually implicit information necessary to analyse the protocol, for instance the public and private context of execution. The roles and the environment are expressed using SPL processes and compositionally translated into high-level Petri nets, while the context specifying the global and local knowledge of the participants in the protocol is used to generate the corresponding initial marking (with respect to the studied property). Finally, this representation is used to analyse the protocol properties, applying techniques of simulation and model-checking on Petri nets. The complete approach is illustrated on the case study of the Kao-Chow authentication protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Armando, A., et al.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281–285. Springer, Heidelberg (2005)

    Google Scholar 

  2. Abadi, M., Blanchet, B.: Analyzing security protocols with secrecy types and logic programs. Journal of the ACM 52(1) (2005)

    Google Scholar 

  3. Abadi, M., Gordon, A.: A calculus for cryptographic protocols. In: The Spi calculus. ACM Conference on Computers and Communication Security. ACM Press, New York (1997)

    Google Scholar 

  4. Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology 15(2) (2002)

    Google Scholar 

  5. Al-Azzoni, I., Down, D.G., Khedri, R.: Modelling and verification of cryptographic protocols using coloured Petri nets and Design/CPN. Nordic Journal of Computing 12(3) (2005)

    Google Scholar 

  6. Best, E., Devillers, R., Koutny, M.: Petri Net Algebra. In: EATCS Monographs on TCS. Springer, Heidelberg (2001)

    Google Scholar 

  7. Best, E., Fra̧czak, W., Hopkins, R.P., Klaudel, H., Pelz, E.: M-nets: an algebra of high level Petri nets, with an application to the semantics of concurrent programming languages. Acta Informatica 35 (1998)

    Google Scholar 

  8. Blanchet, B.: A computationally sound mechanized prover for security protocols. In: IEEE Symposium on Security and Privacy (2006)

    Google Scholar 

  9. Bouroulet, R., Klaudel, H., Pelz, E.: A semantics of Security Protocol Language (SPL) using a class of composable high-level Petri nets. In: ACSD 2004. IEEE Computer Society, Los Alamitos (2004)

    Google Scholar 

  10. Bouroulet, R., Klaudel, H., Pelz, E.: Modelling and verification of authentication using enhanced net semantics of SPL (Security Protocol Language). In: ACSD 2006. IEEE Computer Society, Los Alamitos (2006)

    Google Scholar 

  11. Christensen, S., Hansen, N.D.: Coloured Petri Nets Extended with Place Capacities, Test Arcs and Inhibitor Arcs. In: Ajmone Marsan, M. (ed.) ICATPN 1993. LNCS, vol. 691. Springer, Heidelberg (1993)

    Google Scholar 

  12. Clark, J., Jacob, J.: A survey of authentication protocol literature: Version 1.0 (1997), http://www.cs.york.ac.uk/jac/papers/drareview.ps.gz

  13. Cortier, V., Warinschi, B.: Computationally sound, automated proofs for security protocols. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 157–171. Springer, Heidelberg (2005)

    Google Scholar 

  14. Crazzolara, F., Winskel, G.: Events in security protocols. In: ACM Conf on Computer and Communications Security. ACM Press, New York (2001)

    Google Scholar 

  15. Denker, G., Millen, J.: CAPSL Integrated Protocol Environment. In: DISCEX 2000. IEEE Computer Society, Los Alamitos (2000)

    Google Scholar 

  16. Dill, D.L., Drexler, A.J., Hu, A.J., Han Yang, C.: Protocol Verification as a Hardware Design Aid. In: IEEE International Conference on Computer Design: VLSI in Computers and Processors (1992)

    Google Scholar 

  17. Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Transactions on Information Theory IT-29 12 (1983)

    Google Scholar 

  18. Donovan, B., Norris, P., Lowe, G.: Analyzing a library of security protocols using Casper and FDR. In: Workshop on Formal Methods and Security Protocols (1999)

    Google Scholar 

  19. Evangelista, S.: High Level Petri Nets Analysis with Helena. In: Ciardo, G., Darondeau, P. (eds.) ICATPN 2005. LNCS, vol. 3536, pp. 455–464. Springer, Heidelberg (2005), http://helena.cnam.fr/

    Google Scholar 

  20. Gordon, A., Jeffrey, A.: Authenticity by Typing for Security Protocols. In: IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos (2001)

    Google Scholar 

  21. Kao, I.-L., Chow, R.: An efficient and secure authentication protocol using uncertified keys. In: Operating Systems Review, vol. 29(3), ACM Press, New York (1995)

    Google Scholar 

  22. Kremer, S., Raskin, J.-F.: A Game-Based Verification of Non-Repudiation and Fair Exchange Protocols. Journal of Computer Security 11(3) (2003)

    Google Scholar 

  23. Lowe, G.: An attack on the Needham-Schroeder public key authentication protocol. Information Processing Letters 56(3) (1995)

    Google Scholar 

  24. Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using (FDR). In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055. Springer, Heidelberg (1996)

    Google Scholar 

  25. Meadows, C.: Formal Methods for Cryptographic Protocol Analysis: Emerging Issues and Trends. IEEE Journal on Selected Areas in Communication 21(1) (2003)

    Google Scholar 

  26. Milner, R.: Communicating and mobile systems: The π-calculus. Cambridge University Press, Cambridge (1999)

    Google Scholar 

  27. Mitchell, J.C., Mitchell, M., Stern, U.: Automated Analysis of Cryptographic Protocols Using Murϕ. In: IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos (1997)

    Google Scholar 

  28. Needham, R.M., Schroeder, M.D.: Using Encrypton for Authentication in Large Networks of Computers. Comm. of the ACM 21(12) (1978)

    Google Scholar 

  29. Nieh, B.B., Tavares, S.E.: Modelling and Analyzing Cryptographic Protocols Using Petri Nets. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718. Springer, Heidelberg (1993)

    Google Scholar 

  30. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystem. Comm. of the ACM 21(2) (1978)

    Google Scholar 

  31. Schneier, B.: Applied Cryptography. Wiley, Chichester (1996)

    Google Scholar 

  32. Thayer, F., Herzog, J.C., Guttman, J.D.: Strand Spaces: Why is a Security Protocol Correct? In: IEEE Symposium on Security and Privacy (1998)

    Google Scholar 

  33. Song, D.: Athena: A new efficient automatic checker for security protocol analysis. In: CSFW 1999. IEEE Computer Society Press, Los Alamitos (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Kees M. van Hee Rüdiger Valk

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bouroulet, R., Devillers, R., Klaudel, H., Pelz, E., Pommereau, F. (2008). Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets. In: van Hee, K.M., Valk, R. (eds) Applications and Theory of Petri Nets. PETRI NETS 2008. Lecture Notes in Computer Science, vol 5062. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-68746-7_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-68746-7_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-68745-0

  • Online ISBN: 978-3-540-68746-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics