On the representation and verification of cryptographic protocols in a theory of action

Cryptographic protocols are usually specified in an informal, ad hoc language, with crucial elements, such as the protocol goal, left implicit. We suggest that this is one reason that such protocols are difficult to analyse, and are subject to subtle and nonintuitive attacks. We present an approach...

Full description

Saved in:
Bibliographic Details
Published in2010 Eighth Annual International Conference on Privacy, Security and Trust pp. 39 - 45
Main Authors Delgrande, James P, Hunter, Aaron, Grote, Torsten
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.08.2010
Subjects
Online AccessGet full text
ISBN9781424475513
1424475511
DOI10.1109/PST.2010.5593236

Cover

Abstract Cryptographic protocols are usually specified in an informal, ad hoc language, with crucial elements, such as the protocol goal, left implicit. We suggest that this is one reason that such protocols are difficult to analyse, and are subject to subtle and nonintuitive attacks. We present an approach for formalising and analysing cryptographic protocols in a theory of action, specifically the situation calculus. Our thesis is that all aspects of a protocol must be explicitly specified. We provide a declarative specification of underlying assumptions and capabilities in the situation calculus. A protocol is translated into a sequence of actions to be executed by the principals, and a successful attack is an executable plan by an intruder that compromises the specified goal. Our prototype verification software takes a protocol specification, translates it into a high-level situation calculus (Golog) program, and outputs any attacks that can be found. We describe the structure and operation of our prototype software, and discuss performance issues.
AbstractList Cryptographic protocols are usually specified in an informal, ad hoc language, with crucial elements, such as the protocol goal, left implicit. We suggest that this is one reason that such protocols are difficult to analyse, and are subject to subtle and nonintuitive attacks. We present an approach for formalising and analysing cryptographic protocols in a theory of action, specifically the situation calculus. Our thesis is that all aspects of a protocol must be explicitly specified. We provide a declarative specification of underlying assumptions and capabilities in the situation calculus. A protocol is translated into a sequence of actions to be executed by the principals, and a successful attack is an executable plan by an intruder that compromises the specified goal. Our prototype verification software takes a protocol specification, translates it into a high-level situation calculus (Golog) program, and outputs any attacks that can be found. We describe the structure and operation of our prototype software, and discuss performance issues.
Author Hunter, Aaron
Delgrande, James P
Grote, Torsten
Author_xml – sequence: 1
  givenname: James P
  surname: Delgrande
  fullname: Delgrande, James P
  email: jim@cs.sfu.ca
  organization: Sch. of Comput. Sci., Simon Fraser Univ., Burnaby, BC, Canada
– sequence: 2
  givenname: Aaron
  surname: Hunter
  fullname: Hunter, Aaron
  email: hunter@cs.sfu.ca
  organization: Sch. of Comput. Sci., Simon Fraser Univ., Burnaby, BC, Canada
– sequence: 3
  givenname: Torsten
  surname: Grote
  fullname: Grote, Torsten
  email: Torsten.Grote@uni-potsdam.de
  organization: Inst. fur Inf., Univ. Potsdam, Potsdam, Germany
BookMark eNotkE9LAzEUxCMqaOveBS_5Alvzd9McpWgVChWs6K3E7IuN1CRkg7Df3l26c3nM8HtzmBm6CDEAQreULCgl-v71bbdgZHBSas54c4ZmVDAhlBT68xxVWi0nLym_QlXX_ZBBQjLaiGv0sQ24HABnSBk6CMUUHwM2ocV_kL3z9hREh23uU4nf2aSDtzjlWKKNxw77AR87Yu5HzNjx4QZdOnPsoJruHL0_Pe5Wz_Vmu35ZPWxqT5UstXaEMQKWiJa1QkprmVGOSmUFKCWcU8RwopayNVQzah1TTHw5Y7RsyADwObo79XoA2Kfsf03u99MW_B8_qFSp
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/PST.2010.5593236
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 142447549X
1424475740
1424475503
9781424475742
9781424475490
9781424475506
EndPage 45
ExternalDocumentID 5593236
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ADFMO
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIB
RIC
RIE
RIL
ID FETCH-LOGICAL-i175t-9f0220ec04d2d455cc2a7f157c4e774ff70a30785da1921cf2724bfaa95607743
IEDL.DBID RIE
ISBN 9781424475513
1424475511
IngestDate Wed Aug 27 03:00:26 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-9f0220ec04d2d455cc2a7f157c4e774ff70a30785da1921cf2724bfaa95607743
PageCount 7
ParticipantIDs ieee_primary_5593236
PublicationCentury 2000
PublicationDate 2010-Aug.
PublicationDateYYYYMMDD 2010-08-01
PublicationDate_xml – month: 08
  year: 2010
  text: 2010-Aug.
PublicationDecade 2010
PublicationTitle 2010 Eighth Annual International Conference on Privacy, Security and Trust
PublicationTitleAbbrev PST
PublicationYear 2010
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000452164
Score 1.4772345
Snippet Cryptographic protocols are usually specified in an informal, ad hoc language, with crucial elements, such as the protocol goal, left implicit. We suggest that...
SourceID ieee
SourceType Publisher
StartPage 39
SubjectTerms Calculus
Chromium
Cryptographic protocols
Cryptography
Software
Vocabulary
Title On the representation and verification of cryptographic protocols in a theory of action
URI https://ieeexplore.ieee.org/document/5593236
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH5sO3lS2cTf5ODRbG2TrOtZHEOYDtxwt5GfMIR2zO4w_3pfmnaieJBe0vAoIX3N-5r3vi8AdzaWQuKiR1MTc8oVl1RhFKKMWwx4ykUq8nzn6fNwsuBPS7Fswf2BC2OtrYrPbN83q1y-KfTOb5UNEP2yhA3b0EY3C1ytw36KlwZH6N9wt1JEAnEj6VTfsyZNGWWD2es81HXVz_xxuEoVW8bHMG1GFUpK3vu7UvX15y_Bxv8O-wR63yw-MjvEp1No2bwLby85QcxHKjHLhniUE5kbgk7t64ZCR-GI3u43ZVC0XmviBR0K9JoPskZzUhEg994sMCN6sBg_zh8mtD5cga4RMZQ0c55ja3XETWK4EFonMnWxSDW3CAmdSyOJ3_9IGOkl07RL0oQrJ6X_oUIDdgadvMjtOZAsEoic1IjHsePCSeW0zRhe0jCEe8ML6PpJWW2Cfsaqno_Lv7uv4Chk6H2R3TV0yu3O3mDgL9Vt9ca_AIe2qb0
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFH5BPOhJDRjFXz14dLCtLWNnI0EFJBEiN9J2bUJMNoLjgH-9r-uG0Xgwu2zNy9J0Tb9vfe_7CnCrA8EFLnpelATMY5IJTyIKeZRpBDxpfOlbvfNo3B3M2NOcz2twt9PCaK2L4jPdtrdFLj_J1MZulXWQ_dKQdvdgH3GfcafW2u2oWHNwJP-VeitCLhBUpk7lM60SlX7cmbxOXWVX-dYfx6sU6NI_glHVL1dU8t7e5LKtPn9ZNv6348fQ_NbxkckOoU6gptMGvL2kBFkfKewsK-lRSkSaEJzWtnLINWSGqPV2lTtP66Ui1tIhw3nzQZYYTgoJ5NaGOW1EE2b9h-n9wCuPV_CWyBlyLzZWZauVz5IwYZwrFYrIBDxSTCMpNCbyBa4APZ4Ia5qmTBiFTBoh7C8VBtBTqKdZqs-AxD5H7iR7LAgM40ZIo3RM8RIJRcLXPYeGHZTFyjloLMrxaP3dfAMHg-louBg-jp8v4NDl623J3SXU8_VGXyENyOV18fW_AJ8wrQo
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+Eighth+Annual+International+Conference+on+Privacy%2C+Security+and+Trust&rft.atitle=On+the+representation+and+verification+of+cryptographic+protocols+in+a+theory+of+action&rft.au=Delgrande%2C+James+P&rft.au=Hunter%2C+Aaron&rft.au=Grote%2C+Torsten&rft.date=2010-08-01&rft.pub=IEEE&rft.isbn=9781424475513&rft.spage=39&rft.epage=45&rft_id=info:doi/10.1109%2FPST.2010.5593236&rft.externalDocID=5593236
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424475513/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424475513/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424475513/sc.gif&client=summon&freeimage=true