1998
DOI: 10.3233/jcs-1998-61-205
|View full text |Cite
|
Sign up to set email alerts
|

The inductive approach to verifying cryptographic protocols

Abstract: Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is based on ordinary predicate calculus and copes with infinite-state systems. Proofs are generated using Isabelle/HOL. The human effort required to analyze a protocol can be as little as a week or two, yielding a proof script that takes a few minutes to run.Protocols are inductively defined as sets of traces. A trace is a list of communication events, perhaps comprising many interleaved pr… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

4
504
0
1

Year Published

2001
2001
2006
2006

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 620 publications
(518 citation statements)
references
References 37 publications
4
504
0
1
Order By: Relevance
“…Since the environment of the card is assumed to be hostile the message received may be any message that has already been sent, not just one that is directed to the card (this simple model of available messages is also used in many abstract specifications of security protocols, e.g. the traces of [Pau98] The protocol is started by two messages startFrom(msgna, value, msgno) and startTo(msgna, value, msgno) which are sent to the from and to purse respectively by the interface device. These two messages are assumed to be always available, so the initial ether already contains every such message.…”
Section: The Concrete Levelmentioning
confidence: 99%
“…Since the environment of the card is assumed to be hostile the message received may be any message that has already been sent, not just one that is directed to the card (this simple model of available messages is also used in many abstract specifications of security protocols, e.g. the traces of [Pau98] The protocol is started by two messages startFrom(msgna, value, msgno) and startTo(msgna, value, msgno) which are sent to the from and to purse respectively by the interface device. These two messages are assumed to be always available, so the initial ether already contains every such message.…”
Section: The Concrete Levelmentioning
confidence: 99%
“…Our definition of analysis refines the usual approach reminiscent of Paulson [Pau98]. Instead of directly defining a "flat" analysis set, we had to define a finitely stratified hierarchy (A n (K)) n∈N .…”
Section: Definitionmentioning
confidence: 99%
“…We do so by means of projection, focusing on the message components of our knowledge sets. This comparison is mainly intended to help readers who are familiar with Paulson's inductive approach (see [Pau98]) to better understand our formalism. In particular, we show that the stratified analysis of a message set yields a complete knowledge seed.…”
mentioning
confidence: 99%
“…We use the inductive method of protocol verification, which has been described elsewhere [11,13]. This operational semantics assumes a population of honest agents obeying the protocol and a dishonest agent (the Spy) who can steal messages intended for other agents, decrypt them using any keys at his disposal and send new messages as he pleases.…”
Section: The Inductive Modelmentioning
confidence: 99%