A framework for compositional verification of security protocols

  • Authors:
  • Suzana Andova;Cas Cremers;Kristian Gjøsteen;Sjouke Mauw;Stig F. Mjølsnes;Saša Radomirović

  • Affiliations:
  • Department of Telematics, NTNU, N-7491 Trondheim, Norway;Department of Computer Science, ETH Zürich, 8092 Zürich, Switzerland;Department of Mathematical Sciences, NTNU, N-7491 Trondheim, Norway;Université du Luxembourg, Faculté des Sciences, de la Technologie et de la Communication, 6, rue Richard Coudenhove-Kalergi, L-1359, Luxembourg;Department of Telematics, NTNU, N-7491 Trondheim, Norway;Université du Luxembourg, Faculté des Sciences, de la Technologie et de la Communication, 6, rue Richard Coudenhove-Kalergi, L-1359, Luxembourg

  • Venue:
  • Information and Computation
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Automatic security protocol analysis is currently feasible only for small protocols. Since larger protocols quite often are composed of many small protocols, compositional analysis is an attractive, but non-trivial approach. We have developed a framework for compositional analysis of a large class of security protocols. The framework is intended to facilitate automatic as well as manual verification of large structured security protocols. Our approach is to verify properties of component protocols in a multi-protocol environment, then deduce properties about the composed protocol. To reduce the complexity of multi-protocol verification, we introduce a notion of protocol independence and prove a number of theorems that enable analysis of independent component protocols in isolation. To illustrate the applicability of our framework to real-world protocols, we study a key establishment sequence in WiMAX consisting of three subprotocols. Except for a small amount of trivial reasoning, the analysis is done using automatic tools.