Automatic verification of cryptographic protocols in first-order logic

  • Authors:
  • Jihong Han;Zhiyong Zhou;Yadi Wang

  • Affiliations:
  • Zhengzhou Information Science and Technology Institute, Zhengzhou, Henan, China;Zhengzhou Information Science and Technology Institute, Zhengzhou, Henan, China;Zhengzhou Information Science and Technology Institute, Zhengzhou, Henan, China

  • Venue:
  • ICAI'07 Proceedings of the 8th Conference on 8th WSEAS International Conference on Automation and Information - Volume 8
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, a new first-order logical framework and method of formalizing and verifying cryptographic protocols is presented. From the point of view of an intruder, the protocol and abilities of the intruder are modeled in Horn clauses. Based on deductive reasoning method, secrecy of cryptographic protocols is verified automatically, and if the secrecy is violated, attack scenarios can be presented through back-tracing. The method has been implemented in an automatic verifier, many examples of protocols have been analyzed in less then 1s.