Oh!... is it really you? : using rank functions to verify authentication protocols
A security protocol is a mechanism designed to allow secure communications through an insecure medium, even when that medium is controlled by a hostile attacker. Historically, approaches to analysis of security protocols have fallen into two broad categories: model checking and theorem proving. Each...
Main Author: | |
---|---|
Published: |
Royal Holloway, University of London
2000
|
Subjects: | |
Online Access: | http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.394363 |
id |
ndltd-bl.uk-oai-ethos.bl.uk-394363 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-bl.uk-oai-ethos.bl.uk-3943632015-03-19T05:07:20ZOh!... is it really you? : using rank functions to verify authentication protocolsHeather, James2000A security protocol is a mechanism designed to allow secure communications through an insecure medium, even when that medium is controlled by a hostile attacker. Historically, approaches to analysis of security protocols have fallen into two broad categories: model checking and theorem proving. Each has its strengths, but the weaknesses of each are all too apparent. Model checking suffers from the problem of being able to check only a finite system; theorem proving is difficult to automate and often produces no conclusive results. Schneider's previous work on rank functions provides a formal approach to verification of certain properties of a security protocol. In this thesis, we develop the theory to allow for an arbitrarily large network, and give a clearly defined decision procedure by which one may either construct a rank function, proving correctness of the protocol, or show that no rank function exists. We show how the algorithm may be implemented to give a means of analysing authentication protocols that avoids the inherent limitations of both model checking and theorem proving. We discuss the implications of the absence of a rank function, and the open question of completeness of the rank function theorem.004.01Royal Holloway, University of Londonhttp://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.394363http://epubs.surrey.ac.uk/56953/Electronic Thesis or Dissertation |
collection |
NDLTD |
sources |
NDLTD |
topic |
004.01 |
spellingShingle |
004.01 Heather, James Oh!... is it really you? : using rank functions to verify authentication protocols |
description |
A security protocol is a mechanism designed to allow secure communications through an insecure medium, even when that medium is controlled by a hostile attacker. Historically, approaches to analysis of security protocols have fallen into two broad categories: model checking and theorem proving. Each has its strengths, but the weaknesses of each are all too apparent. Model checking suffers from the problem of being able to check only a finite system; theorem proving is difficult to automate and often produces no conclusive results. Schneider's previous work on rank functions provides a formal approach to verification of certain properties of a security protocol. In this thesis, we develop the theory to allow for an arbitrarily large network, and give a clearly defined decision procedure by which one may either construct a rank function, proving correctness of the protocol, or show that no rank function exists. We show how the algorithm may be implemented to give a means of analysing authentication protocols that avoids the inherent limitations of both model checking and theorem proving. We discuss the implications of the absence of a rank function, and the open question of completeness of the rank function theorem. |
author |
Heather, James |
author_facet |
Heather, James |
author_sort |
Heather, James |
title |
Oh!... is it really you? : using rank functions to verify authentication protocols |
title_short |
Oh!... is it really you? : using rank functions to verify authentication protocols |
title_full |
Oh!... is it really you? : using rank functions to verify authentication protocols |
title_fullStr |
Oh!... is it really you? : using rank functions to verify authentication protocols |
title_full_unstemmed |
Oh!... is it really you? : using rank functions to verify authentication protocols |
title_sort |
oh!... is it really you? : using rank functions to verify authentication protocols |
publisher |
Royal Holloway, University of London |
publishDate |
2000 |
url |
http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.394363 |
work_keys_str_mv |
AT heatherjames ohisitreallyyouusingrankfunctionstoverifyauthenticationprotocols |
_version_ |
1716740310180036608 |