Application of dependency graphs to security protocol analysis

  • Authors:
  • Ilja Tšahhirov;Peeter Laud

  • Affiliations:
  • Tallinn University of Technology;Tartu University and Cybernetica AS

  • Venue:
  • TGC'07 Proceedings of the 3rd conference on Trustworthy global computing
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present a computationally sound technique of static analysis for confidentiality in cryptographic protocols. The technique is a combination of the dependency flow graphs presented by Beck and Pingali and our earlier works - we start with the protocol representation as a dependency graph indicating possible flows of data in all possible runs of the protocol and replace the cryptographic operations with constructions which are "obviously secure". Transformations are made in such a way that the semantics of the resulting graph remains computationally indistinguishable from the semantics of the original graph. The transformed graphs are analysed again; the transformations are applied until no more transformations are possible. A protocol is deemed secure if its transformed version is secure; the transformed versions are amenable to a very simple security analysis. The framework is well-suited for producing fully automated (with zero user input) proofs for protocol security.