메뉴 건너뛰기




Volumn 21, Issue 1, 2003, Pages 44-54

Formal methods for cryptographic protocol analysis: Emerging issues and trends

Author keywords

Cryptographic protocols; Formal methods; Security

Indexed keywords

ALGORITHMS; COMPUTER NETWORKS; DATA COMMUNICATION SYSTEMS; FINITE AUTOMATA; FORMAL LOGIC; MATHEMATICAL MODELS; NETWORK PROTOCOLS; SECURITY OF DATA; STATISTICAL METHODS; TELECOMMUNICATION TRAFFIC;

EID: 0037250964     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2002.806125     Document Type: Article
Times cited : (164)

References (86)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • Sept.
    • M. Abadi, "Secrecy by typing in security protocols," J. ACM, vol. 46, no. 5, pp. 749-786, Sept. 1999
    • (1999) J. ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 2
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • Spring
    • M. Abadi and P. Rogaway, "Reconciling two views of cryptography (the computational soundness of formal encryption)," J. Cryptology, vol. 5, pp. 103-127, Spring 2002.
    • (2002) J. Cryptology , vol.5 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 5
    • 84885216561 scopus 로고    scopus 로고
    • On the reachability problem in cryptographic protocols
    • R. Amadio and D. Lugiez, "On the reachability problem in cryptographic protocols," in Proc. CONCUR, 2000, pp. 380-394.
    • Proc. CONCUR, 2000 , pp. 380-394
    • Amadio, R.1    Lugiez, D.2
  • 6
    • 84944035753 scopus 로고    scopus 로고
    • Formal verification of cardholder registration in SET
    • F. Cuppens, Ed. New York: Springer-Verlag
    • G. Bella, F. Massacci, L. C. Paulson, and P. Tramontano, "Formal verification of cardholder registration in SET," in Computer Security-ESORICS 2000, F. Cuppens, Ed. New York: Springer-Verlag, 2000, pp. 159-174.
    • (2000) Computer Security-ESORICS 2000 , pp. 159-174
    • Bella, G.1    Massacci, F.2    Paulson, L.C.3    Tramontano, P.4
  • 7
    • 22444455879 scopus 로고    scopus 로고
    • Kerberos version IV: Inductive analysis of the secrecy goal
    • J.-J. Quisquater et al., Eds. New York: Springer-Verlag
    • G. Bella et al., "Kerberos version IV: Inductive analysis of the secrecy goal," in Computer Security-ESORICS 98, J.-J. Quisquater et al., Eds. New York: Springer-Verlag, 1998, pp. 361-375.
    • (1998) Computer Security-ESORICS 98 , pp. 361-375
    • Bella, G.1
  • 8
    • 0012842066 scopus 로고
    • The private communication technology protocol
    • [Online]
    • J. Benaloh, B. Lampson, D. Simon, T. Spies, and B. Yee. (1995) The private communication technology protocol. [Online]. available: draft-benaloch-pct-00.txt
    • (1995)
    • Benaloh, J.1    Lampson, B.2    Simon, D.3    Spies, T.4    Yee, B.5
  • 17
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses and digital signatures
    • Feb.
    • D. Chaum, "Untraceable electronic mail, return addresses and digital signatures," Commun. ACM, vol. 24, pp. 84-88, Feb. 1981.
    • (1981) Commun. ACM , vol.24 , pp. 84-88
    • Chaum, D.1
  • 21
    • 0003902378 scopus 로고    scopus 로고
    • The CAPSL integrated protocol environment
    • SRI International, Palo Alto, CA, SRI-CSL-2002-02
    • G. Denker, J. Millen, and H. Ruess, "The CAPSL integrated protocol environment," SRI International, Palo Alto, CA, SRI-CSL-2002-02, 2000.
    • (2000)
    • Denker, G.1    Millen, J.2    Ruess, H.3
  • 22
    • 0020190170 scopus 로고
    • On the security of ping-pong protocols
    • D. Dolev, S. Even, and R. Karp, "On the security of ping-pong protocols," Inform. Control, pp. 57-68, 1982.
    • (1982) Inform. Control , pp. 57-68
    • Dolev, D.1    Even, S.2    Karp, R.3
  • 23
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Mar.
    • D. Dolev and A. Yao, "On the security of public key protocols," IEEE Trans. Inform. Theory, vol. IT-29, pp. 198-208, Mar. 1983.
    • (1983) IEEE Trans. Inform. Theory , vol.IT-29 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 25
    • 84949641590 scopus 로고    scopus 로고
    • Using a PVS embedding of CSP to verify authentication protocols
    • B. Dutertre and S. Schneider, "Using a PVS embedding of CSP to verify authentication protocols," in Proc. TPHOLS'97, 1997, pp. 121-136.
    • Proc. TPHOLS'97, 1997 , pp. 121-136
    • Dutertre, B.1    Schneider, S.2
  • 27
    • 0012796639 scopus 로고    scopus 로고
    • A security evaluation of IPSec
    • M. Blaze, J. Ioannides, A. Keromytis, and J. Smith, Eds. Readng, MA: Addison-Wesley, to be published
    • N. Ferguson and B. Schneier, "A security evaluation of IPSec," in The IPSec Papers, M. Blaze, J. Ioannides, A. Keromytis, and J. Smith, Eds. Readng, MA: Addison-Wesley, to be published.
    • The IPSec Papers
    • Ferguson, N.1    Schneier, B.2
  • 29
    • 0005063385 scopus 로고    scopus 로고
    • Onion routing for anonymous and private internet connections
    • Feb.
    • D. Goldschlag, M. Reed, and P. Syverson, "Onion routing for anonymous and private internet connections," Commun. ACM, vol. 42, pp. 39-41, Feb. 1999.
    • (1999) Commun. ACM , vol.42 , pp. 39-41
    • Goldschlag, D.1    Reed, M.2    Syverson, P.3
  • 30
    • 0003161603 scopus 로고    scopus 로고
    • Fail-stop protocols: An approach to designing secure protocols
    • R. K. Iyer, M. Morganti, W. K. Fuchs, and V. Gligor, Eds. Piscataway, NJ: IEEE
    • L. Gong and P. Syverson, "Fail-stop protocols: An approach to designing secure protocols," in Dependable Computing for Critical Applications 5, R. K. Iyer, M. Morganti, W. K. Fuchs, and V. Gligor, Eds. Piscataway, NJ: IEEE, 1998, pp. 79-100.
    • (1998) Dependable Computing for Critical Applications 5 , pp. 79-100
    • Gong, L.1    Syverson, P.2
  • 33
    • 0012793531 scopus 로고    scopus 로고
    • The Internet Key Exchange (IKE), Internet Engineering Task Force. [Online]
    • D. Harkins and D. Carrel. (1998) The Internet Key Exchange (IKE), Internet Engineering Task Force. [Online]. Available: http://ietf.org/rfc/rfc2409.txt
    • (1998)
    • Harkins, D.1    Carrel, D.2
  • 35
    • 0001924088 scopus 로고    scopus 로고
    • A model for secure protocols and their composition
    • Jan.
    • N. Heintze and J. D. Tygar, "A model for secure protocols and their composition," IEEE Trans. Softw. Eng., vol. 22, pp. 16-30, Jan. 1996.
    • (1996) IEEE Trans. Softw. Eng. , vol.22 , pp. 16-30
    • Heintze, N.1    Tygar, J.D.2
  • 37
    • 0004077031 scopus 로고    scopus 로고
    • Photuris: Session-key management protocol
    • Internet Engineering Task Force. [Online]
    • P. Karn and W. Simpson. (1999) Photuris: Session-Key Management Protocol. Internet Engineering Task Force. [Online]. Available: http://ietf.org/rfc/rfc2522.txt
    • (1999)
    • Karn, P.1    Simpson, W.2
  • 39
    • 0024665744 scopus 로고
    • Using formal methods to analyze encryption protocols
    • May
    • R. Kemmerer, "Using formal methods to analyze encryption protocols," IEEE J. Select. Areas Commun., vol. 7, pp. 448-457, May 1989.
    • (1989) IEEE J. Select. Areas Commun. , vol.7 , pp. 448-457
    • Kemmerer, R.1
  • 40
    • 58149520900 scopus 로고    scopus 로고
    • A game-based verification of nonrepuditation and fair exchange protocols
    • New York: Springer-Verlag
    • S. Kremer and J.-F. Raskin, "A game-based verification of nonrepuditation and fair exchange protocols," in CONCUR 2001-Concurrency Theory. New York: Springer-Verlag, 2001.
    • (2001) CONCUR 2001-Concurrency Theory
    • Kremer, S.1    Raskin, J.-F.2
  • 41
    • 84958052989 scopus 로고    scopus 로고
    • Probabilistic polynomial-time equivalence and security analysis
    • J. Wing, J. Woodcock, and J. Davies, Eds. New York: Springer-Verlag
    • P. Lincoln, J. Mitchell, M. Mitchell, and A. Scedrov, "Probabilistic polynomial-time equivalence and security analysis," in FM'99-Formal Methods, J. Wing, J. Woodcock, and J. Davies, Eds. New York: Springer-Verlag, 1999, pp. 776-793.
    • (1999) FM'99-Formal Methods , pp. 776-793
    • Lincoln, P.1    Mitchell, J.2    Mitchell, M.3    Scedrov, A.4
  • 42
    • 0026837069 scopus 로고
    • An automatic search for security flaws in key management schemes
    • D. Longley and S. Rigby, "An automatic search for security flaws in key management schemes," Comput. Security, vol. 11, pp. 75-90, 1992.
    • (1992) Comput. Security , vol.11 , pp. 75-90
    • Longley, D.1    Rigby, S.2
  • 43
    • 26444574191 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • G. Lowe, "Breaking and fixing the Needham-Schroeder public-key protocol using FDR," Softw.-Concepts Tools, vol. 17, no. 3, pp. 93-102, 1996.
    • (1996) Softw.-Concepts Tools , vol.17 , Issue.3 , pp. 93-102
    • Lowe, G.1
  • 44
    • 0033353968 scopus 로고    scopus 로고
    • Toward a completeness results for model checking security protocols
    • ____, "Toward a completeness results for model checking security protocols," J. Comput. Security, vol. 7, pp. 89-146, 1999.
    • (1999) J. Comput. Security , vol.7 , pp. 89-146
    • Lowe, G.1
  • 46
    • 0342880800 scopus 로고
    • Applying formal methods to the analysis of a key management protocol
    • C. Meadows, "Applying formal methods to the analysis of a key management protocol," J. Comput. Security, vol. 1, pp. 5-53, 1992.
    • (1992) J. Comput. Security , vol.1 , pp. 5-53
    • Meadows, C.1
  • 47
    • 84940106630 scopus 로고    scopus 로고
    • Analysis of the internet key exchange protocol using the NRL protocol analyzer
    • ____, "Analysis of the Internet key exchange protocol using the NRL protocol analyzer," in Proc. 1999 Symp. Security and Privacy, May 1999, pp. 216-213.
    • Proc. 1999 Symp. Security and Privacy, May 1999 , pp. 216-213
    • Meadows, C.1
  • 49
    • 0012795935 scopus 로고    scopus 로고
    • Extending formal cryptographic protocol analysis techniques for group protocols and low-level cryptographic primitives
    • P. Degano, Ed., Geneva, Switzerland, July 8-9
    • ____, "Extending formal cryptographic protocol analysis techniques for group protocols and low-level cryptographic primitives," in Proc. 1st Workshop Issues Theory Security-WITS'00, P. Degano, Ed., Geneva, Switzerland, July 8-9, 2000, pp. 87-92.
    • (2000) Proc. 1st Workshop Issues Theory Security-WITS'00 , pp. 87-92
    • Meadows, C.1
  • 50
    • 84961720022 scopus 로고    scopus 로고
    • Open issues in formal methods for cryptographic protocol analysis
    • ____, "Open issues in formal methods for cryptographic protocol analysis," in Proc. DISCEX 2000, Jan. 2000, pp. 237-250.
    • Proc. DISCEX 2000, Jan. 2000 , pp. 237-250
    • Meadows, C.1
  • 53
    • 0004256761 scopus 로고
    • Cryptographic protocols
    • Ph.D. dissertation, Georgia Inst. Technol., Atlanta, GA
    • M. J. Merritt, "Cryptographic protocols," Ph.D. dissertation, Georgia Inst. Technol., Atlanta, GA, 1983.
    • (1983)
    • Merritt, M.J.1
  • 56
  • 57
    • 0003684287 scopus 로고    scopus 로고
    • CAPSL: Common authentication protocol specification language
    • The MITRE Corp. [Online]
    • J. K. Millen. (1997) CAPSL: Common authentication protocol specification language. The MITRE Corp. [Online]. Available: http://www.csl.sri.com/millen/capsl
    • (1997)
    • Millen, J.K.1
  • 60
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Dec.
    • R. M. Needham and M. D. Schroeder, "Using encryption for authentication in large networks of computers," Commun. ACM, vol. 21, pp. 993-999, Dec. 1978.
    • (1978) Commun. ACM , vol.21 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 62
    • 85024252307 scopus 로고    scopus 로고
    • Inductive analysis of the internet protocol TLS
    • L. C. Paulson, "Inductive analysis of the internet protocol TLS," ACM Trans. Comput. Syst. Security, vol. 2, no. 3, pp. 332-351, 1999.
    • (1999) ACM Trans. Comput. Syst. Security , vol.2 , Issue.3 , pp. 332-351
    • Paulson, L.C.1
  • 63
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • ____, "The inductive approach to verifying cryptographic protocols," J. Comput. Security, vol. 6, no. 1/2, pp. 85-128, 1998.
    • (1998) J. Comput. Security , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.C.1
  • 64
    • 4244028378 scopus 로고    scopus 로고
    • Guarded transitions in evolving specifications
    • Kestrel Inst.
    • D. Pavlovic and D. R. Smith, "Guarded Transitions in Evolving Specifications," Kestrel Inst., 2002.
    • (2002)
    • Pavlovic, D.1    Smith, D.R.2
  • 71
    • 84959345746 scopus 로고    scopus 로고
    • SET Secure Electronic Transactions LLC
    • The SET Specification.; [Online]
    • The SET Specification. SET Secure Electronic Transactions LLC. [Online]. Available: http://www.setco.org/set_specifications.html
  • 73
    • 0037076869 scopus 로고    scopus 로고
    • Finite-state analysis of two contract-signing protocols
    • June
    • V. Shmatikov and J. Mitchell, "Finite-state analysis of two contract-signing protocols," Theor. Comput. Sci., pp. 419-450, June 2000.
    • (2000) Theor. Comput. Sci. , pp. 419-450
    • Shmatikov, V.1    Mitchell, J.2
  • 74
    • 0035072287 scopus 로고    scopus 로고
    • Athena: A novel approach to efficient automatic security protocol analysis
    • D. Song, S. Berezin, and A. Perrig, "Athena: A novel approach to efficient automatic security protocol analysis," J. Comput. Security, vol. 9, pp. 47-74, 2001.
    • (2001) J. Comput. Security , vol.9 , pp. 47-74
    • Song, D.1    Berezin, S.2    Perrig, A.3
  • 77
    • 0033741481 scopus 로고    scopus 로고
    • Formal characterization and automated analysis of known-pair and chosen-text attacks
    • Apr.
    • S. Stubblebine and C. Meadows, "Formal characterization and automated analysis of known-pair and chosen-text attacks," IEEE J. Select. Areas Commun., vol. 18, pp. 571-581, Apr. 2000.
    • (2000) IEEE J. Select. Areas Commun. , vol.18 , pp. 571-581
    • Stubblebine, S.1    Meadows, C.2
  • 78
    • 84924758404 scopus 로고    scopus 로고
    • Group principals and the formalization of anonymity
    • J. Wing, J. Woodcock, and J. Davies, Eds. New York: Springer-Verlag
    • P. Syverson and S. Stubblebine, "Group principals and the formalization of anonymity," in FM'99-Formal Methods, J. Wing, J. Woodcock, and J. Davies, Eds. New York: Springer-Verlag, 1999, pp. 814-833.
    • (1999) FM'99-Formal Methods , pp. 814-833
    • Syverson, P.1    Stubblebine, S.2
  • 86
    • 0032669524 scopus 로고    scopus 로고
    • Fixing a security flaw in IKE protocols
    • June
    • J. Zhou, "Fixing a security flaw in IKE protocols," Electron. Lett., vol. 35, pp. 1072-1073, June 1999.
    • (1999) Electron. Lett. , vol.35 , pp. 1072-1073
    • Zhou, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.