The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Formal analysis of modern security protocols

Author

Yasinsac, Alec; Childs, Justin

Entry type

article

Abstract

Analyzing security protocols is notoriously difficult. In this paper, we show how a novel tool for analyzing classical cryptographic protocols can be used to model and analyze complex Internet security protocol families. CPAL-ES allows the representation of the interaction between two sub-protocols. Within a protocol such as Transport Layer Security (TLS) these are selected from a collection of sub-protocols utilized by a principal. Modeling subversion related to sub-protocol interactions is an important part of formally understanding attacks upon protocol suites. The CPAL environment contains sufficient functionality to verify the feasibility of these attacks. We also define and classify the characteristics that add complexity to modern security protocol and some impacts this complexity has on security protocol analysis. Finally, we discuss the modifications that were necessary in our formal method tool to answer this complexity and show how the tool illuminated flaws in the TLS protocol.

Date

2004 – 04 – 05

Journal

Information Sciences an International Journal

Key alpha

Yasinsac

Number

INS 7054

Publisher

Elsevier Inc.

Affiliation

Computer Science Department, Flordia State University

Publication Date

2004-04-05

Copyright

2004 by Elsevier Inc.

Keywords

Network security; Formal methods; Cryptographic protocols; Weakest preconditions

Language

English

Location

A hard-copy of this is in the Papers Cabinet

Subject

modern security protocols

BibTex-formatted data

To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports.