Foundations of Security Protocol Analysis

By: Suresh, S. P [author]Material type: TextTextPublication details: 2003Description: ix; 141pSubject(s): Computer Science | Logics | Security Protocol Analysis | Verification-Secrecy, AuthenticityOnline resources: Click here to access online Dissertation note: 2003Ph.DUniversity of Madras Abstract: One of the central problems in the automatic verification of security protocols is that of verifying whether a given protocol leaks secrets or not. It identifies syntactic subclasses of protocols for which the secrecy problem is decidable. It also concerns reasoning about protocols. The author introduces a logic using which interesting properties of protocols can be specified and reasoned about. A formal model of security protocols is set up, and several important properties about the model are proved. In particular the properties relating to synth and anlz proofs which formalise the way the agents running a protocol derive new information from the old. The secrecy problem is considered and shown that it is undecidable both when the set of nonces is infinite and when the length of messages is unbounded. Relatively simple and uniform proofs for both these results are proved. Then the secrecy problem is considered in the setting of infintely many nonces, but bounded message length. It is proved that for a syntactic subclass of protocols called 'tagged protocols' the secrecy problem in this setting is decidable. It is also proved that the tagged protocol has a leaky run iff it has a leaky run containing only bounded length messages; And further the secrecy problem for tagged protocols is decidable even in the setting where both message length and number of nonces is unbounded. About reasoning, a logic is defined in which one can easily specify several interesting security properties like secrecy, authenticity, etc., Some examples are given to illustrate how to reason about protocols. Some of the undecidability and decidability results are extended to the verification problem of logic.
Item type: THESIS & DISSERTATION
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Current library Home library Call number Materials specified URL Status Date due Barcode
IMSc Library
IMSc Library
UNM TH-79 (Browse shelf (Opens below)) Link to resource Available 56254

2003

Ph.D

University of Madras

One of the central problems in the automatic verification of security protocols is that of verifying whether a given protocol leaks secrets or not. It identifies syntactic subclasses of protocols for which the secrecy problem is decidable. It also concerns reasoning about protocols. The author introduces a logic using which interesting properties of protocols can be specified and reasoned about. A formal model of security protocols is set up, and several important properties about the model are proved. In particular the properties relating to synth and anlz proofs which formalise the way the agents running a protocol derive new information from the old. The secrecy problem is considered and shown that it is undecidable both when the set of nonces is infinite and when the length of messages is unbounded. Relatively simple and uniform proofs for both these results are proved. Then the secrecy problem is considered in the setting of infintely many nonces, but bounded message length. It is proved that for a syntactic subclass of protocols called 'tagged protocols' the secrecy problem in this setting is decidable. It is also proved that the tagged protocol has a leaky run iff it has a leaky run containing only bounded length messages; And further the secrecy problem for tagged protocols is decidable even in the setting where both message length and number of nonces is unbounded. About reasoning, a logic is defined in which one can easily specify several interesting security properties like secrecy, authenticity, etc., Some examples are given to illustrate how to reason about protocols. Some of the undecidability and decidability results are extended to the verification problem of logic.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha