Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder

  • Authors:
  • Francis Klay;Laurent Vigneron

  • Affiliations:
  • France Telecom R&D, Lannion, France;LORIA, Nancy Université, Vandoeuvre-lès-Nancy, France

  • Venue:
  • Formal Aspects in Security and Trust
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Non-repudiation protocols have an important role in many areas where secured transactions with proofs of participation are necessary. Formal methods are clever and without error, therefore using them for verifying such protocols is crucial. In this purpose, we show how to partially represent non-repudiation as a combination of authentications on the Fair Zhou-Gollmann protocol. After discussing the limitations of this method, we define a new one, based on the handling of the knowledge of protocol participants. This second method is general and of natural use, as it consists in adding simple annotations in the protocol specification. It is very easy to implement in tools able to handle participants knowledge. We have implemented it in the AVISPA Tool and analyzed the Fair Zhou-Gollmann protocol and the optimistic Cederquist-Corin-Dashti protocol, discovering attacks in each. This extension of the AVISPA Tool for handling non-repudiation opens a highway to the specification of many other properties, without any more change in the tool itself.