Skip to main content

A Supporting Environment for Formal Analysis of Cryptographic Protocols

  • Conference paper
  • First Online:
  • 1369 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 448))

Abstract

Formal analysis of cryptographic protocols is to find out flaws in the protocols by various formal methods. Some supporting tools for formal analysis of cryptographic protocols have been proposed and applied, but the tools failed to support the whole processes of formal analysis automatically. Therefore, a supporting environment which can support formal analysis automatically is needed for analysts. This paper presents the first supporting environment for formal analysis of cryptographic protocols.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Avalle, M., Alfredo, P., Riccardo, S.: Formal verification of security protocol implementations: a survey. Formal Aspects Comput. 26(1), 99 (2014)

    Article  Google Scholar 

  2. Bau, J., Mitchell, J.C.: Security modeling and analysis. IEEE Secur. Priv. 9(3), 18–25 (2011)

    Article  Google Scholar 

  3. Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, pp. 82–96. IEEE, (2001)

    Google Scholar 

  4. Blanchet, B., Smyth, B., Cheval, V.: ProVerif 1.96: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial (2016)

    Google Scholar 

  5. Meadows, C.A.: Formal verification of cryptographic protocols: a survey. In: International Conference on the Theory and Application of Cryptology. Springer, Heidelberg (1994)

    Google Scholar 

  6. Meadows, C.A.: Formal methods for cryptographic protocol analysis: emerging issues and trends. IEEE J. Sel. Areas Commun. 21(1), 44–54 (2003)

    Article  Google Scholar 

  7. Cheng, J., Miura, J.: Deontic relevant logic as the logical basis for specifying, verifying, and reasoning about information security and information assurance. In: Proceedings of the 1st International Conference on Availability, Reliability, and Security, pp. 601–608. IEEE-CS (2006)

    Google Scholar 

  8. Cheng, J., Nara, S., Goto, Y.: FreeEnCal: a forward reasoning engine with general-purpose. In: Proceedings of the 11th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, Lecture Notes in Artificial Intelligence, vol. 4693, pp. 444–452. Springer-Verlag, Heidelberg (2007)

    Google Scholar 

  9. Clarke, E.M., Grumberg, O., Peled, D.: Model Checking. MIT Press, Cambridge (1999)

    Google Scholar 

  10. Cortier, V., Steve, K., Bogdan, W.: A survey of symbolic methods in computational analysis of cryptographic systems. J. Autom. Reasoning 46(3–4), 225–259 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  11. Cremers, C.: On the protocol composition logic PCL. In: Proceedings of the 2008 ACM Symposium on Information, Computer, and Communications Security, pp. 66–76. ACM (2008)

    Google Scholar 

  12. Cremers, C.: Scyther User Manual (2014)

    Google Scholar 

  13. Futatsugi, K., Diaconescu, R.: CafeOBJ report. World Scientific (1998)

    Google Scholar 

  14. Heidorn, G.E.: Automatic programming through natural language dialogue: a survey. In: Readings in Artificial Intelligence and Software Engineering, pp. 203–214 (1986)

    Google Scholar 

  15. Paulson, C.: The inductive approach to verifying cryptographic protocols. J. Comput. Secur. 6, 85–128 (1998)

    Article  Google Scholar 

  16. Wagatsuma, K., Shogo, A., Goto, Y., Cheng, J.: Formalization for formal analysis of cryptographic protocols with reasoning approach, In: Future Information Technology, Lecture Notes in Electrical Engineering, vol. 309, pp. 211–218. Springer, Heidelberg (2014)

    Google Scholar 

  17. Wagatsuma, K., Harada, T., Anze, S., Goto, Y., Cheng J.: A supporting tool for spiral model of cryptographic protocol design with reasoning-based formal analysis, In: Advanced Multimedia and Ubiquitous Engineering - Future Information Technology, LNEE, vol. 354, pp. 25–32. Springer, Heidelberg (2015)

    Google Scholar 

  18. Yan, J., Wagatsuma, K., Gao, H., Cheng, J.: A formal analysis method with reasoning for cryptographic protocols. In: Proceedings of the 12th International Conference on Computational Intelligence and Security, pp. 566–570. IEEE Computer Society (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jingde Cheng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Yan, J., Wagatsuma, K., Gao, H., Cheng, J. (2017). A Supporting Environment for Formal Analysis of Cryptographic Protocols. In: Park, J., Chen, SC., Raymond Choo, KK. (eds) Advanced Multimedia and Ubiquitous Engineering. FutureTech MUE 2017 2017. Lecture Notes in Electrical Engineering, vol 448. Springer, Singapore. https://doi.org/10.1007/978-981-10-5041-1_87

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-5041-1_87

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-5040-4

  • Online ISBN: 978-981-10-5041-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics