Abstract
Formal analysis of cryptographic protocols is to find out flaws in the protocols by various formal methods. Some supporting tools for formal analysis of cryptographic protocols have been proposed and applied, but the tools failed to support the whole processes of formal analysis automatically. Therefore, a supporting environment which can support formal analysis automatically is needed for analysts. This paper presents the first supporting environment for formal analysis of cryptographic protocols.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Avalle, M., Alfredo, P., Riccardo, S.: Formal verification of security protocol implementations: a survey. Formal Aspects Comput. 26(1), 99 (2014)
Bau, J., Mitchell, J.C.: Security modeling and analysis. IEEE Secur. Priv. 9(3), 18–25 (2011)
Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, pp. 82–96. IEEE, (2001)
Blanchet, B., Smyth, B., Cheval, V.: ProVerif 1.96: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial (2016)
Meadows, C.A.: Formal verification of cryptographic protocols: a survey. In: International Conference on the Theory and Application of Cryptology. Springer, Heidelberg (1994)
Meadows, C.A.: Formal methods for cryptographic protocol analysis: emerging issues and trends. IEEE J. Sel. Areas Commun. 21(1), 44–54 (2003)
Cheng, J., Miura, J.: Deontic relevant logic as the logical basis for specifying, verifying, and reasoning about information security and information assurance. In: Proceedings of the 1st International Conference on Availability, Reliability, and Security, pp. 601–608. IEEE-CS (2006)
Cheng, J., Nara, S., Goto, Y.: FreeEnCal: a forward reasoning engine with general-purpose. In: Proceedings of the 11th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, Lecture Notes in Artificial Intelligence, vol. 4693, pp. 444–452. Springer-Verlag, Heidelberg (2007)
Clarke, E.M., Grumberg, O., Peled, D.: Model Checking. MIT Press, Cambridge (1999)
Cortier, V., Steve, K., Bogdan, W.: A survey of symbolic methods in computational analysis of cryptographic systems. J. Autom. Reasoning 46(3–4), 225–259 (2011)
Cremers, C.: On the protocol composition logic PCL. In: Proceedings of the 2008 ACM Symposium on Information, Computer, and Communications Security, pp. 66–76. ACM (2008)
Cremers, C.: Scyther User Manual (2014)
Futatsugi, K., Diaconescu, R.: CafeOBJ report. World Scientific (1998)
Heidorn, G.E.: Automatic programming through natural language dialogue: a survey. In: Readings in Artificial Intelligence and Software Engineering, pp. 203–214 (1986)
Paulson, C.: The inductive approach to verifying cryptographic protocols. J. Comput. Secur. 6, 85–128 (1998)
Wagatsuma, K., Shogo, A., Goto, Y., Cheng, J.: Formalization for formal analysis of cryptographic protocols with reasoning approach, In: Future Information Technology, Lecture Notes in Electrical Engineering, vol. 309, pp. 211–218. Springer, Heidelberg (2014)
Wagatsuma, K., Harada, T., Anze, S., Goto, Y., Cheng J.: A supporting tool for spiral model of cryptographic protocol design with reasoning-based formal analysis, In: Advanced Multimedia and Ubiquitous Engineering - Future Information Technology, LNEE, vol. 354, pp. 25–32. Springer, Heidelberg (2015)
Yan, J., Wagatsuma, K., Gao, H., Cheng, J.: A formal analysis method with reasoning for cryptographic protocols. In: Proceedings of the 12th International Conference on Computational Intelligence and Security, pp. 566–570. IEEE Computer Society (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Yan, J., Wagatsuma, K., Gao, H., Cheng, J. (2017). A Supporting Environment for Formal Analysis of Cryptographic Protocols. In: Park, J., Chen, SC., Raymond Choo, KK. (eds) Advanced Multimedia and Ubiquitous Engineering. FutureTech MUE 2017 2017. Lecture Notes in Electrical Engineering, vol 448. Springer, Singapore. https://doi.org/10.1007/978-981-10-5041-1_87
Download citation
DOI: https://doi.org/10.1007/978-981-10-5041-1_87
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-5040-4
Online ISBN: 978-981-10-5041-1
eBook Packages: EngineeringEngineering (R0)