Back to Search Start Over

Modeling security properties of authentication of cryptographic protocols using spin formal verification

Authors :
L.K. Babenko
E.A. Perevyshina
Source :
Informatization and communication. :21-25
Publication Year :
2020
Publisher :
Informatization and Communication Journal Editorial Board, 2020.

Abstract

To assess the quality and security of cryptographic protocols, we use various formal verification tools, such as Scyther tool, Avispa, ProVerif. these formal verifiers can check the protocol for vulnerability to attacks on secrecy and authentication, as these are the most prevalent attacks on protocols. However, this is not enough to fully analyze the security of the protocol. In this article, we will use linear temporal logic (LTL) model checking with SPIN. This tool, unlike the formal verifiers listed above, is not designed for a specific application in the context of cryptographic protocols; however, it has a very wide range of possibilities. In particular, for each security property, it is possible to describe the behavior of an attacker and test for the stability of the protocol model to its various attacks. The purpose of this work is to describe the developed methodology for verifying the security of authentication properties using the SPIN verifier.

Details

ISSN :
20788320
Database :
OpenAIRE
Journal :
Informatization and communication
Accession number :
edsair.doi...........aa2fd3383f4a1dca79f1ce68d5bc7b91
Full Text :
https://doi.org/10.34219/2078-8320-2020-11-3-21-25