- 1、本文档共7页,可阅读全部内容。
- 2、有哪些信誉好的足球投注网站(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
08-Inductive Method
1Protocol Verification by
the Inductive Method
John Mitchell
CS 259
Analysis Techniques
Crypto Protocol Analysis
Formal Models Computational Models
Modal Logics Model Checking Inductive Proofs
Dolev-Yao
(perfect cryptography)
Random oracle
Probabilistic process calculi
Probabilistic I/O automata
…
Finite processes,
finite attacker
Process Calculi …
Finite processes,
infinite attacker
Spi-calculusBAN logic
Recall: protocol state space
Participant + attacker
actions define a state
transition graph
A path in the graph is a
trace of the protocol
Graph can be
? Finite if we limit number of
agents, size of message, etc.
? Infinite otherwise
...
...
Analysis using theorem proving
Correctness instead of bugs
? Use higher-order logic to reason about possible
protocol executions
No finite bounds
? Any number of interleaved runs
? Algebraic theory of messages
? No restrictions on attacker
Mechanized proofs
? Automated tools can fill in parts of proofs
? Proof checking can prevent errors in reasoning
[Paulson]
Inductive proofs
Define set of traces
? Given protocol, a trace is one possible
sequence of events, including attacks
Prove correctness by induction
? For every state in every trace, no
security condition fails
– Works for safety properties only
? Proof by induction on the length of trace
Two forms of induction
Usual form for ?n∈Nat. P(n)
? Base case: P(0)
? Induction step: P(x) ? P(x+1)
? Conclusion: ?n∈Nat. P(n)
Minimial counterexample form
? Assume: ?x [ ?P(x) ∧ ?yx. P(y) ]
? Prove: contraction
? Conclusion: ?n∈Nat. P(n)
Both equivalent to “the natural numbers are well-ordered”
2Use second form
Given set of traces
? Choose shortest sequence to bad state
? Assume all steps before that OK
? Derive contradiction
– Consider all possible steps
All states are good Bad state
Sample Protocol Goals
Authenticity: who sent it?
? Fails if A receives message from B but thinks it
is from C
Integrity: has it been altered?
? Fails if A receives message from
您可能关注的文档
- (Annals of the Brazilian Academy of Sciences).pdf
- !!Chapter 1 Introduction to management and organizaitions.pdf
- (07 TMC) Bandwidth sharing schemes for multimedia traffic in the IEEE 802.11e contention-based WLANs.pdf
- (2007-Scarpellini)High dosage rifaximin for the treatment of small intestinal bacterial overgrowth.pdf
- (NH4)0.5V2O5 nanobelt.pdf
- (PCF中文)2007119163812.pdf
- !!Large-area submicron replica molding of porous low-k dielectric films and application to photonic.pdf
- (psychology, self-help) Bipolar Disorder - Stories of Coping and Courage.pdf
- (AUO)DMO_G085VW01_V0_preliminary_spec_Aug2009.pdf
- (Workshop Chairs) ECDL WS Generalized Documents 2001 Applications of Information Hiding and.pdf
文档评论(0)