Abstract
A cryptographic protocol is an algorithm involving exchanges of encrypted information carried out by principals in a distributed environment. It is intended to produce secure communications, even if every message can be read by, or originate with, every principal. This paper gives a definitional HOL formalization of a “belief logic” based on the full Gong, Needham, and Yahalom [2] logic for analyzing whether protocols achieve desired communication conditions. This gives the “belief logic” a sound formal basis. The paper also sketches the algorithm for a possible HOL tactic automatically constructing proofs that protocols achieve desired communication conditions if they do achieve them.
The author wishes to thank Key Software, particularly Doug Weber, for providing the computing facilities used for this work. Geoffrey Hird answered questions on the Gong, Needham, Yahalom logic. Shiu-Kai Chin provided a copy of HOL90.7. This work was partially supported by Air Force Materiel Command's Electronic Systems Center/Software Center (ESC/ENS), Hanscom AFB, through the Portable, Reusable, Integrated Software Modules (PRISM) contract.
Preview
Unable to display preview. Download preview PDF.
References
M. Burrows and M. Abadi and R. Needham. A Logic of Authentication. In Proceedings of the 12th Symposium on Operating Systems Principles, Litchfield Park, AZ, December 1989. ACM.
L. Gong and R. Needham and R. Yahalom. Reasoning about Belief in Cryptographic Protocols. In Proceedings of the Symposium on Security and Privacy, pages 234–248, Oakland, CA, May 1990. IEEE.
L. Gong. Handling Infeasible Specifications of Cryptographic Protocols. In Proceedings of Computer Security Foundations Workshop IV, pages 99–102, Franconia NH, June 1991. IEEE Computer Society Press.
ORA. Romulus Theories. Technical Report TM-94-0016, Odyssey Research Associates, Ithaca, NY, March 1994.
ORA. Romulus User's Manual. Technical Report TM-94-0018, Odyssey Research Associates, Ithaca, NY, March 1994.
R. Needham and M. Schroeder. Using Encryption for Authentication in Large Networks of Computers. CACM, 21(12):993–999, December 1978.
R. Needham and M. Schroeder. Authentication Revisited. CACM, 21(1):7, January 1987.
J. Steiner and C. Neuman and J. Schiller. An Authentication Service for Open Network Systems. In Proceedings of the USENIX Winter Conference, pages 191–202, February, 1988.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1995 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Brackin, S.H. (1995). Deciding cryptographic protocol adequacy with HOL. In: Thomas Schubert, E., Windley, P.J., Alves-Foss, J. (eds) Higher Order Logic Theorem Proving and Its Applications. TPHOLs 1995. Lecture Notes in Computer Science, vol 971. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-60275-5_59
Download citation
DOI: https://doi.org/10.1007/3-540-60275-5_59
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-60275-0
Online ISBN: 978-3-540-44784-9
eBook Packages: Springer Book Archive