A way to find counterexamples located at deep positions with domain knowledge of authentication protocols

Naomi Okumura, K. Ogata
{"title":"A way to find counterexamples located at deep positions with domain knowledge of authentication protocols","authors":"Naomi Okumura, K. Ogata","doi":"10.1145/3587828.3587859","DOIUrl":null,"url":null,"abstract":"We have model checked that a revised version of the RFC 8120 authentication protocol for HTTP enjoys the four security properties under the assumption that once a password is used for a protocol run, it is leaked to the intruder, such as the intruder, after the protocol run, and random numbers generated by servers are leaked to the intruder. The properties are (1) key secrecy (K-SEC), (2) key sharing (K-SHR), (3) client-point-of-view non-injective agreement (C-NIA), and (4) server-point-of-view non-injective agreement (S-NIA). We intuitively know that the protocol is least likely to enjoy each of the properties under the assumption. Due to the state space explosion, however, it is impossible to find a counterexample for each property with model checking. We have then split each model checking experiment into multiple model checking experiments. We first find a state in which a password has been leaked to the intruder. We next use a state as the initial state to find states in which that K-SEC, C-NIA and S-NIA are broken, respectively. We finally use a state in which C-NIA is broken as the initial state to find a state in which K-SHR is broken.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"163 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3587828.3587859","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

We have model checked that a revised version of the RFC 8120 authentication protocol for HTTP enjoys the four security properties under the assumption that once a password is used for a protocol run, it is leaked to the intruder, such as the intruder, after the protocol run, and random numbers generated by servers are leaked to the intruder. The properties are (1) key secrecy (K-SEC), (2) key sharing (K-SHR), (3) client-point-of-view non-injective agreement (C-NIA), and (4) server-point-of-view non-injective agreement (S-NIA). We intuitively know that the protocol is least likely to enjoy each of the properties under the assumption. Due to the state space explosion, however, it is impossible to find a counterexample for each property with model checking. We have then split each model checking experiment into multiple model checking experiments. We first find a state in which a password has been leaked to the intruder. We next use a state as the initial state to find states in which that K-SEC, C-NIA and S-NIA are broken, respectively. We finally use a state in which C-NIA is broken as the initial state to find a state in which K-SHR is broken.
一种查找具有认证协议领域知识的深层反例的方法
我们进行了模型检查,发现修改后的HTTP RFC 8120身份验证协议具有以下四个安全属性:一旦在协议运行时使用了密码,那么在协议运行后,密码就会泄露给入侵者(例如入侵者),服务器生成的随机数也会泄露给入侵者。这些属性是(1)密钥保密(K-SEC),(2)密钥共享(K-SHR),(3)客户端观点非内射协议(C-NIA),以及(4)服务器观点非内射协议(S-NIA)。我们直观地知道,在假设下,协议最不可能享受每个属性。然而,由于状态空间爆炸,不可能通过模型检查为每个属性找到一个反例。然后将每个模型检验实验拆分为多个模型检验实验。我们首先找到密码泄露给入侵者的状态。接下来,我们使用一个状态作为初始状态,分别找到K-SEC、C-NIA和S-NIA被打破的状态。我们最终使用C-NIA被破坏的状态作为初始状态来寻找K-SHR被破坏的状态。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信