Links Venue SecReT series

Invited Speakers


Michaël Rusinowitch

Title: Protocol Analysis for WS Security

Date: Friday June 18, 09:00

Abstract:

We present some potential applications of security protocol analysis techniques to service oriented computing. In particular we consider the synthesis of a composed service and its validation. This ongoing work takes place in the context of Avantssar project.


Catherine Meadows

Title: Quantifying Pervasive Authentication: The Case of the Hancke-Kuhn Protocol

Date: Friday June 18, 15:00

Abstract:

There is a growing body of work on developing techniques for the formal analysis of cryptographic protocols. However, most of it depends on depends on the representation of cryptographic algorithms as algebraic systems. Although much progress has been made on the richness of the algebraic theories that can be represented, and on proving these theories sound in a computational model, less attention has been devoted to reasoning directly in a probabilistic model.

However, there are important emerging classes of protocols which require such a probabilistic analysis. As mobile devices pervade physical space, the familiar authentication patterns are becoming insufficient: besides entity authentication, many applications require, e.g., location authentication. Many interesting protocols have been proposed and implemented to provide such strengthened forms of authentication, but there are very few proofs that such protocols satisfy the required security properties. In some cases, the proofs can be provided in the symbolic models, albeit with more work and some clever trick. More often, various physical factors invalidate the perfect cryptography assumption, and the symbolic model does not apply. In such cases, the protocol cannot be secure in an absolute logical sense, but only with a high probability. But although probabilistic reasoning is thus necessary, the analysis in the full computational model may not be warranted, since the relative security does not depend on a general computational assumption, but rather upon an assumption of randomness.

We refine the Dolev-Yao algebraic method for protocol analysis by a probabilistic model of guessing, needed to analyze protocols that mix weak cryptography with physical properties of nonstandard communication channels. Applying this model, we provide a precise security proof for a proximity authentication protocol, due to Hancke and Kuhn, that uses probabilistic reasoning to achieve its goals. Finally, we discuss the feasibility of implementing such an approach via rewriting logic.


Bruno Blanchet

Title: The automatic security protocol verifier ProVerif

Date: Saturday June 19, 9:00

Abstract:

ProVerif is an automatic security protocol verifier based on an abstract representation of the protocol by a set of Horn clauses, and on a resolution algorithm on these clauses. This technique allows a flexible encoding of many cryptographic primitives by rewrite rules or equations. It can verify a wide range of security properties of the protocols, such as secrecy, authentication, and some process equivalences, in a fully automatic way. Furthermore, the obtained security proofs are valid for an unbounded message space and an unbounded number of sessions of the protocol, in parallel or not. We will present the basic technique used by ProVerif as well as more recent evolutions and applications.


Ralf Kuesters

Title: Enabling ProVerif to Analyze Protocols with XOR and Diffie-Hellman Exponentiation

Date: Sunday June 20, 9:00

Abstract:

ProVerif is one of the most successful tools for cryptographic protocol analysis. However, dealing with algebraic properties of operators such as the exclusive OR (XOR) and Diffie-Hellman exponentiation has been problematic.

In this talk, I will present an approach which enables ProVerif, and related tools, to analyze a large class of protocols that employ the XOR operator and Diffie-Hellman exponentiation.

The core of our approach is to reduce the derivation problem for Horn theories modulo algebraic properties of XOR/Diffie-Hellman exponentiation to a purely syntactical derivation problem for Horn theories. The latter problem can then be solved by tools such as ProVerif. Our reduction works for a large class of Horn theories, allowing to model a wide range of intruder capabilities and protocols. We implemented our reduction and, in combination with ProVerif, applied it to automatically analyze several state-of-the-art protocols that use XOR or Diffie-Hellman exponentiation.

This talk is based on joint work with Tomasz Truderung, published at CCS 2008 and CSF 2009.





Last modified: Friday June 11 06:26:46 EDT 2010