HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation
Conference papers

Verification of cryptographic protocols: techniques and link to cryptanalysis

Véronique Cortier 1
1 CASSIS - Combination of approaches to the security of infinite states systems
FEMTO-ST - Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174), Inria Nancy - Grand Est, LORIA - FM - Department of Formal Methods
Abstract : Security protocols are short programs aiming at securing communications over a network. They are widely used in our everyday life. Their verification using symbolic models has shown its interest for detecting attacks and proving security properties. In particular, several automatic tools have been developed. However, the guarantees that the symbolic approach offers have been quite unclear compared to the computational approach that considers issues of complexity and probability. This later approach captures a strong notion of security, guaranteed against all probabilistic polynomial-time attacks. In this talk, we present several techniques used for symbolically verifying security protocols and we show that it is possible to obtain the best of both worlds: fully automated proofs and strong, clear security guarantees. For example, for the case of protocols that use signatures and asymmetric encryption, we establish that symbolic integrity and secrecy proofs are sound with respect to the computational model against an active adversary.
Document type :
Conference papers
Complete list of metadata

https://hal.inria.fr/inria-00091656
Contributor : Stephan Merz Connect in order to contact the contributor
Submitted on : Wednesday, September 6, 2006 - 6:55:14 PM
Last modification on : Friday, January 21, 2022 - 3:09:05 AM
Long-term archiving on: : Thursday, September 20, 2012 - 10:20:44 AM

Identifiers

  • HAL Id : inria-00091656, version 1

Citation

Véronique Cortier. Verification of cryptographic protocols: techniques and link to cryptanalysis. Sixth International Workshop on Automatic Verification of Critical Systems - AVOCS'06, Sep 2006, Nancy/France. ⟨inria-00091656⟩

Share

Metrics

Record views

86

Files downloads

35