Abstract
This paper explores the use of Spin for the verification of cryptographic protocol security properties. A general method is proposed to build a Promela model of the protocol and of the intruder capabilities. The method is illustrated showing the modeling of a classical case study, i.e. the Needham-Schroeder Public Key Authentication Protocol. Using the model so built, Spin can find a known attack on the protocol, and it correctly validates the fixed version of the protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Clarke, E.M., Jha, S., Marrero, W.: Verifying security protocols with Brutus. ACM Transactions on Software Engineering and Methodology 9 (2000) 443–487
Lowe, G.: Breaking and fixing the Needham-Shroeder public-key protocol using FDR. In: Proceeding of TACAS96, LNCS 1055, Springer-Verlag (1996) 147–166
Mitchell, J.C., Mitchell, M., Stern, U.: Automated analysis of cryptographic protocols using murphi. In: Proceedings of the 1997 Conference on Security and Privacy (S&P-97), Los Alamitos, IEEE Press (1997) 141–153
Josang, A.: Security protocol verification using SPIN. SPIN’95 Workshop (1995)
Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Communications of the ACM 21 (1978) 993–999
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory IT-22 (1976) 644–654
Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21 (1978) 120–126
Denning, D.E., Sacco, G.M.: Timestamps in key distribution protocols. Communications of the ACM 24 (1981) 533–536
Durante, L., Sisto, R., Valenzano, A.: A state exploration technique for spi-calculus testing equivalence verification. In: Proceedings of FORTE/PSTV 2000, Pisa, Italy, Kluver (2000) 155–170
Lowe, G.: Casper: A compiler for the analysis of security protocols. In: PCSFW: Proceedings of The 10th Computer Security Foundations Workshop, IEEE Computer Society Press (1997)
Ltd., F.S.E.: Failures-Divergence Refinement. FDR2 User Manual. Available at http://www.formal.demon.co.uk/fdr2manual/index.html (3 May 2000)
Lowe, G.: Casper: A compiler for the analysis of security protocols-user manual and tutorial. Available at http://www.mcs.le.ac.uk/~glowe/Security/Casper/manual.ps (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Maggi, P., Sisto, R. (2002). Using SPIN to Verify Security Properties of Cryptographic Protocols. In: Bošnački, D., Leue, S. (eds) Model Checking Software. SPIN 2002. Lecture Notes in Computer Science, vol 2318. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46017-9_14
Download citation
DOI: https://doi.org/10.1007/3-540-46017-9_14
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43477-1
Online ISBN: 978-3-540-46017-6
eBook Packages: Springer Book Archive