Strategy for Flaws Detection based on a Services-driven Model for Group Protocols

Najah Chridi 1 Laurent Vigneron 1
1 CASSIS - Combination of approaches to the security of infinite states systems
FEMTO-ST - Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174), INRIA Lorraine, LORIA - Laboratoire Lorrain de Recherche en Informatique et ses Applications
Abstract : Group key agreement is important in many modern public and dedicated applications. Nevertheless, as they have to be secure, their design is not straightforward. As such, the modelling and the verification of such protocols are necessary in order to avoid eventual weaknesses. This paper investigates a strategy for flaws detection for group protocols properties. The strategy is based on both a services driven model for group protocols and constraint solving. Our strategy has been applied to several group protocols such as GDH.2 and the Asokan-Ginzboorg protocol. This permits to pinpoint new attacks on them. The result found for the case of GDH.2 with four participants can be generalized to $n$ participants. Another general attack has also been found for the case of the A-GDH.2 protocol.
Complete list of metadatas

Cited literature [14 references]  Display  Hide  Download

https://hal.inria.fr/inria-00105519
Contributor : Laurent Vigneron <>
Submitted on : Wednesday, October 11, 2006 - 2:06:25 PM
Last modification on : Friday, July 6, 2018 - 3:06:09 PM
Long-term archiving on : Tuesday, April 6, 2010 - 5:51:57 PM

Identifiers

  • HAL Id : inria-00105519, version 1

Citation

Najah Chridi, Laurent Vigneron. Strategy for Flaws Detection based on a Services-driven Model for Group Protocols. Workshop on Constraints in Software Testing, Verification and Analysis - CSTVA 06, Sep 2006, Nantes/France, pp.88-99. ⟨inria-00105519⟩

Share

Metrics

Record views

276

Files downloads

106