HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation

Automatic Methods for Analyzing Non-Repudiation Protocols with an Active Intruder

Francis Klay 1 Judson Santiago 2 Laurent Vigneron 3
3 CASSIS - Combination of approaches to the security of infinite states systems
FEMTO-ST - Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174), Inria Nancy - Grand Est, LORIA - FM - Department of Formal Methods
Abstract : Non-repudiation protocols have an important role in many areas where secured transactions with proofs of participation are necessary. Formal methods are clever and without error, therefore using them for verifying such protocols is crucial. In this purpose, we show how to partially represent non-repudiation as a combination of authentications on the Fair Zhou-Gollmann protocol. After discussing its limits, we define a new method based on the handling of the knowledge of protocol participants. This method is very general and is of natural use, as it consists in adding simple annotations, like for authentication problems. The method is very easy to implement in tools able to handle participants knowledge. We have implemented it in the AVISPA Tool and analyzed the optimistic Cederquist-Corin- Dashti protocol, discovering two unknown attacks. This extension of the AVISPA Tool for handling non-repudiation opens a highway to the specification of many other properties, without any more change in the tool itself.
Complete list of metadata

Cited literature [26 references]  Display  Hide  Download

Contributor : Rapport de Recherche Inria Connect in order to contact the contributor
Submitted on : Monday, October 22, 2007 - 8:39:29 AM
Last modification on : Friday, January 21, 2022 - 3:09:07 AM
Long-term archiving on: : Tuesday, September 21, 2010 - 2:40:11 PM


Files produced by the author(s)


  • HAL Id : inria-00179550, version 2
  • ARXIV : 0710.3305


Francis Klay, Judson Santiago, Laurent Vigneron. Automatic Methods for Analyzing Non-Repudiation Protocols with an Active Intruder. [Research Report] RR-6324, INRIA. 2007, pp.22. ⟨inria-00179550v2⟩



Record views


Files downloads