A Computationally Sound Mechanized Prover for Security Protocols

We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the computational model. It produces proofs presented as sequences of games; these games are formalized in a probabilistic poly...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on dependable and secure computing Vol. 5; no. 4; pp. 193 - 207
Main Author Blanchet, B.
Format Journal Article
LanguageEnglish
Published Washington IEEE 01.10.2008
IEEE Computer Society
Subjects
Online AccessGet full text
ISSN1545-5971
1941-0018
DOI10.1109/TDSC.2007.1005

Cover

More Information
Summary:We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the computational model. It produces proofs presented as sequences of games; these games are formalized in a probabilistic polynomial-time process calculus. Our tool provides a generic method for specifying security properties of the cryptographic primitives, which can handle shared-key and public-key encryption, signatures, message authentication codes, and hash functions. Our tool produces proofs valid for a number of sessions polynomial in the security parameter, in the presence of an active adversary. We have implemented our tool and tested it on a number of examples of protocols from the literature.
Bibliography:SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ObjectType-Article-2
content type line 23
ISSN:1545-5971
1941-0018
DOI:10.1109/TDSC.2007.1005