Automated analysis of equivalence properties for security protocols using else branches (extended version)

Ivan Gazeau 1 Steve Kremer 1
1 PESTO - Proof techniques for security protocols
Inria Nancy - Grand Est, LORIA - FM - Department of Formal Methods
Abstract : In this paper we present an extension of the AKISS protocol verification tool which allows to verify equivalence properties for protocols with else branches, i.e., disequality tests. While many protocols are represented as linear sequences or inputs, outputs and equality tests, the reality is often more complex. When verifying equivalence properties one needs to model precisely the error messages sent out when equality tests fail. While ignoring these branches may often be safe when studying trace properties this is not the case for equivalence properties, as for instance witnessed by an attack on the European electronic passport. One appealing feature of our approach is that our extension re-uses the saturation procedure which is at the heart of the verification procedure of AKISS as a black box, without need to modify it. As a result we obtain the first tool that is able verify equivalence properties for protocols that may use xor and else branches. We demonstrate the tool's effectiveness on several case studies, including the AKA protocol deployed in mobile telephony.
Type de document :
[Research Report] INRIA Nancy. 2017, pp.29
Liste complète des métadonnées

Littérature citée [31 références]  Voir  Masquer  Télécharger
Contributeur : Ivan Gazeau <>
Soumis le : lundi 26 juin 2017 - 11:46:12
Dernière modification le : mardi 18 décembre 2018 - 16:38:25
Document(s) archivé(s) le : mercredi 17 janvier 2018 - 15:33:40


Fichiers produits par l'(les) auteur(s)


  • HAL Id : hal-01547017, version 1


Ivan Gazeau, Steve Kremer. Automated analysis of equivalence properties for security protocols using else branches (extended version). [Research Report] INRIA Nancy. 2017, pp.29. 〈hal-01547017〉



Consultations de la notice


Téléchargements de fichiers