Specifying Authentication Protocols Using ELAN - Inria - Institut national de recherche en sciences et technologies du numérique Access content directly
Conference Papers Year : 1999

Specifying Authentication Protocols Using ELAN

Abstract

Programming with rewrite rules and strategies has been already used for describing several computational logics. In this paper is described the way the Needham-Schroeder Public-Key protocol is specified in ELAN, the system developed in Nancy for executing rewrite programs. The protocol aims to establish a mutual authentication between an initiator and a responder that communicate via an insecure network. The protocol has been shown vulnerable and a correction has been proposed by G. Lowe. The behavior of the agents and of the intruders as well as the security invariants the protocol should verify are naturally described by conditional rewrite rules. The application of the rewrite rules is controlled by strategies. Similar attacks to those already described in the literature have been discovered. We show how different strategies using the same set of rewrite rules can improve the efficiency in finding the attacks and we compare our results to existing approaches.
Fichier principal
Vignette du fichier
99-R-246.pdf (245.69 Ko) Télécharger le fichier

Dates and versions

inria-00107815 , version 1 (19-10-2006)

Identifiers

  • HAL Id : inria-00107815 , version 1

Cite

Horatiu Cirstea. Specifying Authentication Protocols Using ELAN. Workshop on Modelling & Verification, Dec 1999, Besançon, France, 17 p. ⟨inria-00107815⟩
78 View
81 Download

Share

Gmail Facebook X LinkedIn More