Skip to main content

Verification of Authentication Protocols Based on the Binding Relation

  • Conference paper
  • First Online:
Software Security — Theories and Systems (ISSS 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2609))

Included in the following conference series:

Abstract

The correctness of an authentication protocol is based on, among others, the relation between nonces and data that is established in the course of execution of the protocol. In this paper, we formulate an inference system that derives the secrecy of nonces and the relation that binds nonces and data. It is easy to show the correctness of a protocol by directly deriving the binding relation using the inference rules. Depending on situations, it is also possible to extend the inference system by simply adding new inference rules. We give some example protocols whose correctness can only be shown using some conditions on nonces that are formulated as additional inference rules.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rafael Accorsi, David Basin, Luca Viganò. Towards an Awareness-Based Semantics for Security Protocol Analysis. Proceedings of the First Workshop on Logical Aspects of Cryptographic Protocol Verification, 2001, pp. 9–27.

    Google Scholar 

  2. Michael Burrows, Martín Abadi and Roger Needham. A Logic of Authentication. Proceedings of the Royal Society of London, Vol.426, 1989, pp. 233–271.

    Google Scholar 

  3. Iliano Cervesato, Nancy A. Durgin, Patrick D. Lincoln, John C. Mitchell and Andre Scedrov. Relating Strands and Multiset Rewriting for Security Protocol Analysis. 13th IEEE Computer Security Foundation Workshop, 2000, pp. 35–51.

    Google Scholar 

  4. Ernie Cohen. TAPS: A First-Order Verifier for Cryptographic Protocols. 13th IEEE Computer Security Foundation Workshop, 2000, pp. 144–158.

    Google Scholar 

  5. Joshua D. Guttman and F. Javier Thayer Fábrega. Authentication Tests, Proceedings, 2000 IEEE Symposium on Security and Privacy, 2000, pp. 96–109.

    Google Scholar 

  6. Joshua D. Guttman. Security Protocol Design via Authentication Tests, 15th IEEE Computer Security Foundations Workshop, 2002, pp. 92–103.

    Google Scholar 

  7. Masami Hagiya, Yozo Toda and Yoshiki Fukuba. Implementation and Verification of Authentication Protocols Using Proof Procedures in HOL, 2nd SSR Enterprise Security Workshop, Information Media Center, Science University of Tokyo, Nov 1999, http://nicosia.is.s.u-tokyo.ac.jp/pub/staff/hagiya/ssr99/protveri.ps

  8. Gavin Lowe. Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR. In T. Margaria and B. Steffen, editors, Tools and Algorithms for the Construction and analysis of Systems. Second International Workshop, TACAS’ 96, Lecture Notes in Computer Science, Vol.1055, 1996, pp. 147–166.

    Google Scholar 

  9. J. Millen and V. Shmatikov. Constraint solving for bounded-process cryptographic protocol analysis. 8th ACM Conference on Computer and Communication Security, pp. 166–175, 2001.

    Google Scholar 

  10. John C. Mitchell, Mark Mitchell and Ulrich Stern. Automated Analysis of Cryptographic Protocols Using Murφ. Proceedings of 1997 IEEE Symposium Security and Privacy, 1997, pp. 141–151.

    Google Scholar 

  11. Lawrence C. Paulson. Proving Properties of Security Protocols by Induction. 10th Computer Security Foundations Workshop, June 1997.

    Google Scholar 

  12. Lawrence C. Paulson. Mechanized Proofs of Security Protocols: Needham-Schroeder with Public Keys. Technical Report 413, Computer Laboratory, University of Cambridge, Jan. 1997.

    Google Scholar 

  13. Lawrence C. Paulson. Isabelle: A Generic Theorem Prover. Lecture Notes in Computer Science, Vol.828, Springer, 1994.

    MATH  Google Scholar 

  14. Adrian Perrig and Dawn Song. A First Step on Automatic Protocol Generation of Security Protocols. Proceedings of Network and Distributed System Security, February 2000.

    Google Scholar 

  15. Takamichi Saito, Masami Hagiya and Fumio Mizoguchi. On Authentication Protocols Using Public-key Cryptography, IPSJ Journal, Information Processing Society of Japan, Vol.42, No.8, pp. 2040–2048 (in Japanese).

    Google Scholar 

  16. Dawn Xiaodong Song. Athena: a New Efficient Automatic Checker for Security Protocol Analysis, Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999, pp. 192–202.

    Google Scholar 

  17. F. Javier Thayer Fábrega, Jonathan C. Herzog and Joshua D. Guttman. Strand spaces: Why is a Security Protocol Correct? Proceedings of 1998 IEEE Symposium on Security and Privacy, 1998, pp. 160–171.

    Google Scholar 

  18. F. Javier Thayer Fábrega, Jonathan C. Herzog and Joshua D. Guttman. Honest Ideas on Strand Spaces. Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998, pp. 66–77.

    Google Scholar 

  19. F. Javier Thayer Fábrega, Jonathan C. Herzog and Joshua D. Guttman. Strand Spaces: Proving Security Protocols Correct, Journal of Computer Security, Vol.7, 1999, pp. 191–230.

    Google Scholar 

  20. F. Javier Thayer Fábrega, Jonathan C. Herzog and Joshua D. Guttman. Mixed Strand Spaces. Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999, pp. 72–82.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hagiya, M., Takemura, R., Takahashi, K., Saito, T. (2003). Verification of Authentication Protocols Based on the Binding Relation. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds) Software Security — Theories and Systems. ISSS 2002. Lecture Notes in Computer Science, vol 2609. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36532-X_19

Download citation

  • DOI: https://doi.org/10.1007/3-540-36532-X_19

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00708-1

  • Online ISBN: 978-3-540-36532-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics