Abstract
In this paper we present a fully formal correctness proof of a multi-party version of the Needham-Schroeder-Lowe public key authentication protocol. As the protocol allows for an arbitrary number of participants, the model consisting of all possible protocol executions exceeds any bounds imposed by model checking methods. By modelling the protocol in the CSP-framework and using the Rank Theorem we obtain an abstraction level that allows to give a correctness proof in PVS for the protocol with respect to authentication, for the protocol running in parallel in multiple instantiations, possibly with different numbers of agents for each instance.
This specific result shows how, more generally, the formalisation in CSP and application of the theorem prover PVS make full formal verification of multi-party security protocols possible.
Research funded by the Dutch Organisation for Scientific Research (NWO), project number 612.000.528: Verification and Epistemics of Multi-Party Protocol Security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lowe, G.: Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147–166. Springer, Heidelberg (1996)
Owre, S., Rushby, J.M., Shankar, N.: Prototype Verification System, http://www.csl.sri.com/
Cremers, C., Mauw, S.: A Family of Multi-Party Authentication Protocols. In: First Benelux Workshop on Information and System Security (WISSec) (2006)
Cremers, C.J.F., Mauw, S., de Vink, E.P.: Injective Synchronisation: an Extension of the Authentication Hierarchy. Theor. Comput. Sci. 367(1-2), 139–161 (2006)
Cremers, C.: Scyther tool, http://people.inf.ethz.ch/cremersc/scyther/
Cremers, C.: Scyther – Semantics and Verification of Security Protocols. PhD thesis, Technische Universiteit Eindhoven (November 2006)
Schneider, S.: Verifying Authentication Protocols with CSP. In: CSFW 10, pp. 3–17. IEEE Computer Society Press, Los Alamitos (1997)
Heather, J., Schneider, S.: A Decision Procedure for the Existence of a Rank Function. Journal of Computer Security 13(2), 317–344 (2005)
Ryan, P., Schneider, S.: Modelling and Analysis of Security Protocols. Addison-Wesley, Reading (2001)
Schneider, S., Delicata, R.: Verifying Security Protocols: An Application of CSP. In: Abdallah, A.E., Jones, C.B., Sanders, J.W. (eds.) Communicating Sequential Processes. LNCS, vol. 3525, pp. 243–263. Springer, Heidelberg (2005)
Evans, N., Schneider, S.: Verifying Security Protocols with PVS: Widening the Rank Function Approach. Journal of Logic and Algebraic Programming 64(2), 253–284 (2005)
Verhoeven, R.: PVS-code for this paper, http://www.win.tue.nl/~fdechesn/
Shaikh, S., Bush, V.: Analysing the Woo-Lam Protocol Using CSP and Rank Functions. Journal of Research and Practice in Information Technology 38(1), 19–29 (2006)
Delicata, R., Schneider, S.A.: A Formal Model of Diffie-Hellman Using CSP and Rank Functions. Technical Report CSD-TR-03-05, Department of Computer Science, Royal Holloway, University of London (2003)
Pereira, O., Quisquater, J.J.: Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols. In: CSFW 17, pp. 16–19. IEEE Computer Society Press, Los Alamitos (2004)
Layouni, M., Hooman, J., Tahar, S.: On the correctness of an intrusion-tolerant group communication protocol. In: Geist, D., Tronci, E. (eds.) CHARME 2003. LNCS, vol. 2860, pp. 231–246. Springer, Heidelberg (2003)
Paulson, L.C.: The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security 6(1-2), 85–128 (1998)
Shaikh, S.A., Bush, V.J., Schneider, S.A.: Specifying authentication using signal events in CSP. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol. 3822, pp. 63–74. Springer, Heidelberg (2005)
Roscoe, A.W., Hoare, C.A.R., Bird, R.: The Theory and Practice of Concurrency. Prentice Hall, NJ (1997)
Verhoeven, R.: Proving Correctness of a Multi-Party Authentication Protocol with Rank Functions. Master’s thesis, Technische Universiteit Eindhoven (2007)
Mauw, S., Bos, V.: Drawing Message Sequence Charts with LaTeX. TUGBoat 22(1-2), 87–92 (2001)
Heather, J., Lowe, G., Schneider, S.: How to prevent type flaw attacks on security protocols. In: CSFW 13, pp. 255–268. IEEE Computer Society Press, Los Alamitos (2000)
Dolev, D., Yao, A.: On the Security of Public Key Protocols. IEEE Transactions on Information Theory 29(2), 198–208 (1983)
Lowe, G.: A Hierarchy of Authentication Specifications. In: CSFW 10, pp. 31–44. IEEE Computer Society Press, Los Alamitos (1997)
Meier, S.: A Formalization of an Operational Semantics of Security Protocols. Diploma thesis, ETH Zurich (August 2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Verhoeven, R., Dechesne, F. (2009). Verifying Multi-party Authentication Using Rank Functions and PVS. In: Degano, P., Guttman, J., Martinelli, F. (eds) Formal Aspects in Security and Trust. FAST 2008. Lecture Notes in Computer Science, vol 5491. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01465-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-01465-9_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-01464-2
Online ISBN: 978-3-642-01465-9
eBook Packages: Computer ScienceComputer Science (R0)