Formal Analysis of Security Protocols: Dr. Changyu Dong Cd04@doc - Ic.ac - Uk
Formal Analysis of Security Protocols: Dr. Changyu Dong Cd04@doc - Ic.ac - Uk
Protocols
Dr. Changyu Dong
[email protected]
Security Protocols
Are protocols concerning with
security properties, e.g. integrity and
confidentiality.
For example
SSL, Kerberos, WPA, CHAP, Contract
signing, E-voting, E-money.
Formal Analysis
There are now several methods for
analysing security protocols, based on:
Modal and temporal logics
Process algebras (CSP, pi-calculus)
Theorem-proving tools
BAN Logic
Named after its authors Burrows, Abadi
and Needham.
A modal logic for analysing
authentication protocols.
First formal analysis technique for
Security Protocols.
Easy to use.
Finds many attacks on known protocols.
Authentication, an Intuitive
Example
Imaging you received this email from your
best friends address. Would you click the
link?
Hi,
Here are some wonderful pictures. Click the
link below:
flickr.com
Tom
Authentication, an Intuitive
Example
Now imaging the email is written in this way
Hi,
Remember the guy who drank beer through
his nose last night in the pub? Ive put some
photos online. Click the link below:
flickr.com
Tom
Authentication, an Intuitive
Example
Now imaging you received this email and
your friend Bob told you he received the
same message and the link was genuine.
Hi,
Here are some wonderful pictures. Click the
link below:
flickr.com
Tom
Authentication, an Intuitive
Example
Imaging you received this email again one week
later
Hi,
Remember the guy who drank beer through
his nose last night in the pub? Ive put some
photos online. Click the link below:
flickr.com
Tom
Q.
K
Authentication goals:
formalised
Inference Rules
Message-meaning
Inference Rules
Nonce-verification
Inference Rules
Jurisdiction rule
If P trusts Q as an authority on X,
then P should believe X if Q does so.
Inference Rules
Decomposition rules
Decryption rules
Inference Rules
Freshness rule
Idealise
Initial Assumptions
Kab is pre-shared
Kab is generated by
B
Na is generated by A
Nb is generated by B
key is fresh.
An attacker can mount a replay attack.
Modified Protocol