Reconstruction of attacks against cryptographic protocols

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We study an automatic technique for the verification of cryptographic protocols based on a Horn clause model of the protocol. This technique yields proofs valid for an unbounded number of sessions of the protocol. However, up to now, it gave no definite information when the proof failed. In this paper, we present an algorithm for reconstructing an attack against the protocol when the desired security property does not hold. We have proved soundness, termination, as well as a partial completeness result for our algorithm. We have also implemented it in the automatic protocol verifier ProVerif. As an extreme example, we could reconstruct an attack involving 200 parallel sessions against the f 200g 200 protocol [21].

Original languageEnglish
Title of host publicationProceedings of the 18th IEEE Computer Security Foundations Workshop
Pages140-154
Number of pages15
DOIs
Publication statusPublished - 6 Dec 2005
Event18th IEEE Computer Security Foundations Workshop - Aix-en-Provence, France
Duration: 20 Jun 200522 Jun 2005

Publication series

NameProceedings of the Computer Security Foundations Workshop
ISSN (Print)1063-6900

Conference

Conference18th IEEE Computer Security Foundations Workshop
Country/TerritoryFrance
CityAix-en-Provence
Period20/06/0522/06/05

Fingerprint

Dive into the research topics of 'Reconstruction of attacks against cryptographic protocols'. Together they form a unique fingerprint.

Cite this