Strategy for Flaws Detection based on a Services-driven Model for Group Protocols

1 CASSIS - Combination of approaches to the security of infinite states systems
FEMTO-ST - Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies, INRIA Lorraine, LORIA - Laboratoire Lorrain de Recherche en Informatique et ses Applications
Abstract : Group key agreement is important in many modern public and dedicated applications. Nevertheless, as they have to be secure, their design is not straightforward. As such, the modelling and the verification of such protocols are necessary in order to avoid eventual weaknesses. This paper investigates a strategy for flaws detection for group protocols properties. The strategy is based on both a services driven model for group protocols and constraint solving. Our strategy has been applied to several group protocols such as GDH.2 and the Asokan-Ginzboorg protocol. This permits to pinpoint new attacks on them. The result found for the case of GDH.2 with four participants can be generalized to $n$ participants. Another general attack has also been found for the case of the A-GDH.2 protocol.
Type de document :
Communication dans un congrès
Workshop on Constraints in Software Testing, Verification and Analysis - CSTVA 06, Sep 2006, Nantes/France, pp.88-99, 2006
Domaine :
Liste complète des métadonnées

Littérature citée [14 références]

https://hal.inria.fr/inria-00105519
Contributeur : Laurent Vigneron <>
Soumis le : mercredi 11 octobre 2006 - 14:06:25
Dernière modification le : jeudi 15 février 2018 - 08:48:09
Document(s) archivé(s) le : mardi 6 avril 2010 - 17:51:57

Identifiants

• HAL Id : inria-00105519, version 1

Citation

Najah Chridi, Laurent Vigneron. Strategy for Flaws Detection based on a Services-driven Model for Group Protocols. Workshop on Constraints in Software Testing, Verification and Analysis - CSTVA 06, Sep 2006, Nantes/France, pp.88-99, 2006. 〈inria-00105519〉

Métriques

Consultations de la notice

223

Téléchargements de fichiers