1. Modeling security properties of authentication of cryptographic protocols using spin formal verification
- Author
-
L.K. Babenko and E.A. Perevyshina
- Subjects
Security properties ,Authentication ,Computer science ,business.industry ,0202 electrical engineering, electronic engineering, information engineering ,020207 software engineering ,02 engineering and technology ,Cryptographic protocol ,business ,Formal verification ,Computer network ,Spin-½ - Abstract
To assess the quality and security of cryptographic protocols, we use various formal verification tools, such as Scyther tool, Avispa, ProVerif. these formal verifiers can check the protocol for vulnerability to attacks on secrecy and authentication, as these are the most prevalent attacks on protocols. However, this is not enough to fully analyze the security of the protocol. In this article, we will use linear temporal logic (LTL) model checking with SPIN. This tool, unlike the formal verifiers listed above, is not designed for a specific application in the context of cryptographic protocols; however, it has a very wide range of possibilities. In particular, for each security property, it is possible to describe the behavior of an attacker and test for the stability of the protocol model to its various attacks. The purpose of this work is to describe the developed methodology for verifying the security of authentication properties using the SPIN verifier.
- Published
- 2020
- Full Text
- View/download PDF