Skip to main content

A Logic Programming Based Framework for Security Protocol Verification

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4994))

Abstract

Security protocol analysis has been a major research topic in information security and recognised to be a notoriously hard problem. In this paper, we take the advantage of answer set programming technology to develop an effective framework to verify security protocols carrying claimed security proof under adversary models on computational complexity theory. In our approach, a security protocol, adversary actions and attacks can be formally specified within a unified logic program. Then the verification is performed in an automatic manner by computing the stable models of the underlying logic program. We use Boyd-Gonz\(\acute{a}\)lez Nieto conference key agreement protocol as our case study protocol to demonstrate the effectiveness and efficiency of our approach.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abdalla, M., Chevassut, O., Fouque, P., Pointcheval, D.: A Simple Threshold Authenticated key Exchange from Short Secrets. In: Advances in Cryptology - Asiacrypt 2005, pp. 566–584. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  2. Abadi, M., Rogaway, P.: Reconciling Two Views of Cryptography (The Computaiotnal Soundness of Formal Encryption). Journal of Cryptology 15(2), 103–127 (2002)

    MATH  MathSciNet  Google Scholar 

  3. Aiello, L.C., Massacci, F.: Verifying Security Protocols as Planning in Logic Programming. ACM Transactions on Computational Logic 2(4), 542–580 (2001)

    Article  MathSciNet  Google Scholar 

  4. Backes, M., Jacobi, C.: Cryptographically Sound and Machine-Assisted Verification of Security Protocols. In: Alt, H., Habib, M. (eds.) STACS 2003. LNCS, vol. 2607, pp. 310–329. Springer, Heidelberg (2003)

    Google Scholar 

  5. Baral, C.: Knowledge Representation, Reasoning and Declarative Problem Solving. Cambridge University Press, Cambridge

    Google Scholar 

  6. Boyd, C., González Nieto, J.M.: Round-optimal Contributory Conference Key Agreement. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 161–174. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  7. Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139–155. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  8. Choo, K.R.: Refuting Security Proofs for Tipartite Key Exchange with Model Checker in Planning Problem Setting. In: The 19th IEEE Computer Security Foundations Workshop - CSFW 2006, pp. 297–308 (2006)

    Google Scholar 

  9. Jeong, I.R., Katz, J., Lee, D.H.: One-Round Protocols for Two-Party Authenticated Key Exchange. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 220–232. Springer, Heidelberg (2004)

    Google Scholar 

  10. Lowe, G.: Some New Attacks upon Security Protocols. In: Proceedings of the 9th IEEE Computer Security Foundatons Workshop (CSFW 1996), pp. 162–169. IEEE Computer Society Press, Los Alamitos (1996)

    Chapter  Google Scholar 

  11. Niemela, I., Simons, P., Syrjanen, T.: Smodels: A system for answer set programming. In: Proceedings of the 8th International Workshop on Non-monotonic Reasoning (2000)

    Google Scholar 

  12. Paulson, L.C.: The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security 6, 85–128 (1998)

    Google Scholar 

  13. Ryan, P., Schneider, S.: An Attack on a Recursive Authentication Protocol: A Cautionary Tale. Information Processing Letters 65(15), 7–16 (1998)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Aijun An Stan Matwin Zbigniew W. Raś Dominik Ślęzak

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, S., Zhang, Y. (2008). A Logic Programming Based Framework for Security Protocol Verification. In: An, A., Matwin, S., Raś, Z.W., Ślęzak, D. (eds) Foundations of Intelligent Systems. ISMIS 2008. Lecture Notes in Computer Science(), vol 4994. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-68123-6_70

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-68123-6_70

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-68122-9

  • Online ISBN: 978-3-540-68123-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics