Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 1/22
A Syntactic Criterion for Injectivity of Authentication Protocols
Cas Cremers
joint work with Sjouke Mauw and Erik de Vink
ccremers@win.tue.nl
A Syntactic Criterion for Injectivity of Authentication Protocols - - PowerPoint PPT Presentation
A Syntactic Criterion for Injectivity of Authentication Protocols Cas Cremers joint work with Sjouke Mauw and Erik de Vink ccremers@win.tue.nl Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p.
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 1/22
ccremers@win.tue.nl
Overview Motivation Problem statement Security model Main theorem Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 2/22
■ Security protocol analysis ■ Multi-party protocols ■ Ad-hoc/sensor networks ■ Smartcard security ■ Attack trees ■ Digital Rights Management ■ RFID security ■ Privacy
Overview Motivation Problem statement Security model Main theorem Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 3/22
■ Motivation ■ Problem statement ■ Main theorem ■ Necessity of preconditions ■ Conclusions
Overview Motivation
Problem statement Security model Main theorem Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 4/22
Overview Motivation
Problem statement Security model Main theorem Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 4/22
Overview Motivation
Problem statement Security model Main theorem Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 5/22
Overview Motivation
Problem statement Security model Main theorem Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 5/22
Overview Motivation
Problem statement Security model Main theorem Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 6/22
Overview Motivation
Problem statement Security model Main theorem Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 7/22
Overview Motivation
Problem statement Security model Main theorem Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 7/22
Overview Motivation
Problem statement Security model Main theorem Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 8/22
Overview Motivation
Problem statement Security model Main theorem Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 8/22
Overview Motivation
Problem statement Security model Main theorem Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 9/22
Overview Motivation
Problem statement Security model Main theorem Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 9/22
Overview Motivation
Problem statement Security model Main theorem Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 9/22
Overview Motivation
Problem statement Security model Main theorem Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 10/22
Overview Motivation
Problem statement Security model Main theorem Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 11/22
Overview Motivation Problem statement
Security model Main theorem Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 12/22
Overview Motivation Problem statement
Security model Main theorem Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 13/22
Overview Motivation Problem statement Security model
Main theorem Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 14/22
■ Satisfied by the standard Dolev-Yao model. ■ No need to encrypt/decrypt.
Overview Motivation Problem statement Security model
Main theorem Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 14/22
■ Satisfied by the standard Dolev-Yao model. ■ No need to encrypt/decrypt.
■ Satisfied by Strand Spaces, Operational Semantics. ■ No shared memory. (buffers/time)
Overview Motivation Problem statement Security model Main theorem
Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 15/22
Overview Motivation Problem statement Security model Main theorem
Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 15/22
Overview Motivation Problem statement Security model Main theorem
Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 15/22
Overview Motivation Problem statement Security model Main theorem
Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 16/22
■ duplicating intruder ■ independent role instances
Overview Motivation Problem statement Security model Main theorem
Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 17/22
Overview Motivation Problem statement Security model Main theorem
Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 17/22
Overview Motivation Problem statement Security model Main theorem
Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 18/22
Overview Motivation Problem statement Security model Main theorem
Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 18/22
Overview Motivation Problem statement Security model Main theorem
Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 19/22
Overview Motivation Problem statement Security model Main theorem
Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 19/22
Overview Motivation Problem statement Security model Main theorem Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 20/22
■ LOOP-property can be checked easily. ■ Generic: Sufficient condition for large class of security
■ LOOP plus agreement not sufficient to imply injective
■ Generalizes easily to multi-party protocols with multiple
Overview Motivation Problem statement Security model Main theorem Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 21/22
■ Challenge: Is there a similar condition for agreement?
■ Use in model checker/theorem prover. ■ Analyze other security properties for statically decidable
Overview Motivation Problem statement Security model Main theorem Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 22/22
Overview Motivation Problem statement Security model Main theorem Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 22/22
■ Strand spaces: solicited authentication tests (Guttman,
■ π-calculus: injective correspondence (Gordon, Jeffrey
■ Logic: e-commerce protocol logic (Adi, Debbabi, Mejri
■ Further: Ad-hoc reasoning, informal reasoning, or simply
Overview Motivation Problem statement Security model Main theorem Conclusions
Cas Cremers, July 15, 2005 A Syntactic Criterion for Injectivity of Authentication Protocols - p. 22/22