Oh!... is it really you? : using rank functions to verify authentication protocols

A security protocol is a mechanism designed to allow secure communications through an insecure medium, even when that medium is controlled by a hostile attacker. Historically, approaches to analysis of security protocols have fallen into two broad categories: model checking and theorem proving. Each...

Full description

Bibliographic Details
Main Author: Heather, James
Published: Royal Holloway, University of London 2000
Subjects:
Online Access:http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.394363
id ndltd-bl.uk-oai-ethos.bl.uk-394363
record_format oai_dc
spelling ndltd-bl.uk-oai-ethos.bl.uk-3943632015-03-19T05:07:20ZOh!... is it really you? : using rank functions to verify authentication protocolsHeather, James2000A security protocol is a mechanism designed to allow secure communications through an insecure medium, even when that medium is controlled by a hostile attacker. Historically, approaches to analysis of security protocols have fallen into two broad categories: model checking and theorem proving. Each has its strengths, but the weaknesses of each are all too apparent. Model checking suffers from the problem of being able to check only a finite system; theorem proving is difficult to automate and often produces no conclusive results. Schneider's previous work on rank functions provides a formal approach to verification of certain properties of a security protocol. In this thesis, we develop the theory to allow for an arbitrarily large network, and give a clearly defined decision procedure by which one may either construct a rank function, proving correctness of the protocol, or show that no rank function exists. We show how the algorithm may be implemented to give a means of analysing authentication protocols that avoids the inherent limitations of both model checking and theorem proving. We discuss the implications of the absence of a rank function, and the open question of completeness of the rank function theorem.004.01Royal Holloway, University of Londonhttp://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.394363http://epubs.surrey.ac.uk/56953/Electronic Thesis or Dissertation
collection NDLTD
sources NDLTD
topic 004.01
spellingShingle 004.01
Heather, James
Oh!... is it really you? : using rank functions to verify authentication protocols
description A security protocol is a mechanism designed to allow secure communications through an insecure medium, even when that medium is controlled by a hostile attacker. Historically, approaches to analysis of security protocols have fallen into two broad categories: model checking and theorem proving. Each has its strengths, but the weaknesses of each are all too apparent. Model checking suffers from the problem of being able to check only a finite system; theorem proving is difficult to automate and often produces no conclusive results. Schneider's previous work on rank functions provides a formal approach to verification of certain properties of a security protocol. In this thesis, we develop the theory to allow for an arbitrarily large network, and give a clearly defined decision procedure by which one may either construct a rank function, proving correctness of the protocol, or show that no rank function exists. We show how the algorithm may be implemented to give a means of analysing authentication protocols that avoids the inherent limitations of both model checking and theorem proving. We discuss the implications of the absence of a rank function, and the open question of completeness of the rank function theorem.
author Heather, James
author_facet Heather, James
author_sort Heather, James
title Oh!... is it really you? : using rank functions to verify authentication protocols
title_short Oh!... is it really you? : using rank functions to verify authentication protocols
title_full Oh!... is it really you? : using rank functions to verify authentication protocols
title_fullStr Oh!... is it really you? : using rank functions to verify authentication protocols
title_full_unstemmed Oh!... is it really you? : using rank functions to verify authentication protocols
title_sort oh!... is it really you? : using rank functions to verify authentication protocols
publisher Royal Holloway, University of London
publishDate 2000
url http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.394363
work_keys_str_mv AT heatherjames ohisitreallyyouusingrankfunctionstoverifyauthenticationprotocols
_version_ 1716740310180036608