On the representation and verification of cryptographic protocols in a theory of action
Cryptographic protocols are usually specified in an informal, ad hoc language, with crucial elements, such as the protocol goal, left implicit. We suggest that this is one reason that such protocols are difficult to analyse, and are subject to subtle and nonintuitive attacks. We present an approach...
Saved in:
Published in | 2010 Eighth Annual International Conference on Privacy, Security and Trust pp. 39 - 45 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.08.2010
|
Subjects | |
Online Access | Get full text |
ISBN | 9781424475513 1424475511 |
DOI | 10.1109/PST.2010.5593236 |
Cover
Abstract | Cryptographic protocols are usually specified in an informal, ad hoc language, with crucial elements, such as the protocol goal, left implicit. We suggest that this is one reason that such protocols are difficult to analyse, and are subject to subtle and nonintuitive attacks. We present an approach for formalising and analysing cryptographic protocols in a theory of action, specifically the situation calculus. Our thesis is that all aspects of a protocol must be explicitly specified. We provide a declarative specification of underlying assumptions and capabilities in the situation calculus. A protocol is translated into a sequence of actions to be executed by the principals, and a successful attack is an executable plan by an intruder that compromises the specified goal. Our prototype verification software takes a protocol specification, translates it into a high-level situation calculus (Golog) program, and outputs any attacks that can be found. We describe the structure and operation of our prototype software, and discuss performance issues. |
---|---|
AbstractList | Cryptographic protocols are usually specified in an informal, ad hoc language, with crucial elements, such as the protocol goal, left implicit. We suggest that this is one reason that such protocols are difficult to analyse, and are subject to subtle and nonintuitive attacks. We present an approach for formalising and analysing cryptographic protocols in a theory of action, specifically the situation calculus. Our thesis is that all aspects of a protocol must be explicitly specified. We provide a declarative specification of underlying assumptions and capabilities in the situation calculus. A protocol is translated into a sequence of actions to be executed by the principals, and a successful attack is an executable plan by an intruder that compromises the specified goal. Our prototype verification software takes a protocol specification, translates it into a high-level situation calculus (Golog) program, and outputs any attacks that can be found. We describe the structure and operation of our prototype software, and discuss performance issues. |
Author | Hunter, Aaron Delgrande, James P Grote, Torsten |
Author_xml | – sequence: 1 givenname: James P surname: Delgrande fullname: Delgrande, James P email: jim@cs.sfu.ca organization: Sch. of Comput. Sci., Simon Fraser Univ., Burnaby, BC, Canada – sequence: 2 givenname: Aaron surname: Hunter fullname: Hunter, Aaron email: hunter@cs.sfu.ca organization: Sch. of Comput. Sci., Simon Fraser Univ., Burnaby, BC, Canada – sequence: 3 givenname: Torsten surname: Grote fullname: Grote, Torsten email: Torsten.Grote@uni-potsdam.de organization: Inst. fur Inf., Univ. Potsdam, Potsdam, Germany |
BookMark | eNotkE9LAzEUxCMqaOveBS_5Alvzd9McpWgVChWs6K3E7IuN1CRkg7Df3l26c3nM8HtzmBm6CDEAQreULCgl-v71bbdgZHBSas54c4ZmVDAhlBT68xxVWi0nLym_QlXX_ZBBQjLaiGv0sQ24HABnSBk6CMUUHwM2ocV_kL3z9hREh23uU4nf2aSDtzjlWKKNxw77AR87Yu5HzNjx4QZdOnPsoJruHL0_Pe5Wz_Vmu35ZPWxqT5UstXaEMQKWiJa1QkprmVGOSmUFKCWcU8RwopayNVQzah1TTHw5Y7RsyADwObo79XoA2Kfsf03u99MW_B8_qFSp |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/PST.2010.5593236 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 142447549X 1424475740 1424475503 9781424475742 9781424475490 9781424475506 |
EndPage | 45 |
ExternalDocumentID | 5593236 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ADFMO ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIB RIC RIE RIL |
ID | FETCH-LOGICAL-i175t-9f0220ec04d2d455cc2a7f157c4e774ff70a30785da1921cf2724bfaa95607743 |
IEDL.DBID | RIE |
ISBN | 9781424475513 1424475511 |
IngestDate | Wed Aug 27 03:00:26 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i175t-9f0220ec04d2d455cc2a7f157c4e774ff70a30785da1921cf2724bfaa95607743 |
PageCount | 7 |
ParticipantIDs | ieee_primary_5593236 |
PublicationCentury | 2000 |
PublicationDate | 2010-Aug. |
PublicationDateYYYYMMDD | 2010-08-01 |
PublicationDate_xml | – month: 08 year: 2010 text: 2010-Aug. |
PublicationDecade | 2010 |
PublicationTitle | 2010 Eighth Annual International Conference on Privacy, Security and Trust |
PublicationTitleAbbrev | PST |
PublicationYear | 2010 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0000452164 |
Score | 1.4772345 |
Snippet | Cryptographic protocols are usually specified in an informal, ad hoc language, with crucial elements, such as the protocol goal, left implicit. We suggest that... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 39 |
SubjectTerms | Calculus Chromium Cryptographic protocols Cryptography Software Vocabulary |
Title | On the representation and verification of cryptographic protocols in a theory of action |
URI | https://ieeexplore.ieee.org/document/5593236 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH5sO3lS2cTf5ODRbG2TrOtZHEOYDtxwt5GfMIR2zO4w_3pfmnaieJBe0vAoIX3N-5r3vi8AdzaWQuKiR1MTc8oVl1RhFKKMWwx4ykUq8nzn6fNwsuBPS7Fswf2BC2OtrYrPbN83q1y-KfTOb5UNEP2yhA3b0EY3C1ytw36KlwZH6N9wt1JEAnEj6VTfsyZNGWWD2es81HXVz_xxuEoVW8bHMG1GFUpK3vu7UvX15y_Bxv8O-wR63yw-MjvEp1No2bwLby85QcxHKjHLhniUE5kbgk7t64ZCR-GI3u43ZVC0XmviBR0K9JoPskZzUhEg994sMCN6sBg_zh8mtD5cga4RMZQ0c55ja3XETWK4EFonMnWxSDW3CAmdSyOJ3_9IGOkl07RL0oQrJ6X_oUIDdgadvMjtOZAsEoic1IjHsePCSeW0zRhe0jCEe8ML6PpJWW2Cfsaqno_Lv7uv4Chk6H2R3TV0yu3O3mDgL9Vt9ca_AIe2qb0 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFH5BPOhJDRjFXz14dLCtLWNnI0EFJBEiN9J2bUJMNoLjgH-9r-uG0Xgwu2zNy9J0Tb9vfe_7CnCrA8EFLnpelATMY5IJTyIKeZRpBDxpfOlbvfNo3B3M2NOcz2twt9PCaK2L4jPdtrdFLj_J1MZulXWQ_dKQdvdgH3GfcafW2u2oWHNwJP-VeitCLhBUpk7lM60SlX7cmbxOXWVX-dYfx6sU6NI_glHVL1dU8t7e5LKtPn9ZNv6348fQ_NbxkckOoU6gptMGvL2kBFkfKewsK-lRSkSaEJzWtnLINWSGqPV2lTtP66Ui1tIhw3nzQZYYTgoJ5NaGOW1EE2b9h-n9wCuPV_CWyBlyLzZWZauVz5IwYZwrFYrIBDxSTCMpNCbyBa4APZ4Ia5qmTBiFTBoh7C8VBtBTqKdZqs-AxD5H7iR7LAgM40ZIo3RM8RIJRcLXPYeGHZTFyjloLMrxaP3dfAMHg-louBg-jp8v4NDl623J3SXU8_VGXyENyOV18fW_AJ8wrQo |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+Eighth+Annual+International+Conference+on+Privacy%2C+Security+and+Trust&rft.atitle=On+the+representation+and+verification+of+cryptographic+protocols+in+a+theory+of+action&rft.au=Delgrande%2C+James+P&rft.au=Hunter%2C+Aaron&rft.au=Grote%2C+Torsten&rft.date=2010-08-01&rft.pub=IEEE&rft.isbn=9781424475513&rft.spage=39&rft.epage=45&rft_id=info:doi/10.1109%2FPST.2010.5593236&rft.externalDocID=5593236 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424475513/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424475513/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424475513/sc.gif&client=summon&freeimage=true |