Automated Composition of Security Protocols ela 1 , Iosif Ignat 2 and - - PowerPoint PPT Presentation

automated composition of security protocols
SMART_READER_LITE
LIVE PREVIEW

Automated Composition of Security Protocols ela 1 , Iosif Ignat 2 and - - PowerPoint PPT Presentation

Overview Introduction & Motivation Composition Experimental results Conclusion Automated Composition of Security Protocols ela 1 , Iosif Ignat 2 and Haller Piroska 1 Genge B 1 Petru Maior University of T argu Mure s, Romania


slide-1
SLIDE 1

Overview Introduction & Motivation Composition Experimental results Conclusion

Automated Composition of Security Protocols

Genge B´ ela1, Iosif Ignat2 and Haller Piroska1

1“Petru Maior” University of Tˆ

argu Mure¸ s, Romania {bgenge, phaller}@engineering.upm.ro

2Technical University of Cluj Napoca, Romania

Iosif.Ignat@cs.utcluj.ro August 28, 2009

1 / 33

slide-2
SLIDE 2

Overview Introduction & Motivation Composition Experimental results Conclusion

Presentation overview

Introduction & Motivation Proposed composition method Security protocol specification Experimental results Conclusions and future work

2 / 33

slide-3
SLIDE 3

Overview Introduction & Motivation Composition Experimental results Conclusion

Basic concepts

Security protocols are “communication protocols dedicated to achieving security goals” (Cremers and Mauw, 2005) such as confidentiality, integrity or availability Over the last decade, researcher’s attention focused more on developing new security protocol design methods One of the most popular methods is the composition: building new protocols from several existing smaller protocols

3 / 33

slide-4
SLIDE 4

Overview Introduction & Motivation Composition Experimental results Conclusion

Motivating scenario

Service interconnection is a problem frequently encountered and addressed by many researchers today There are many proposals dealing with the composition of service capabilities (Srivastava et all 2003, Arpinar et all 2004, Feenstra et all 2007, ...)

4 / 33

slide-5
SLIDE 5

Overview Introduction & Motivation Composition Experimental results Conclusion

Motivating scenario (cont’d)

When using security protocols, the composition of services becomes a difficult task Existing solutions rely on using standard parameterized protocols implemented by every service ⇒ Services implementing new security protocols can not be composed with other services

5 / 33

slide-6
SLIDE 6

Overview Introduction & Motivation Composition Experimental results Conclusion

Related work - security protocol composition

One of the first proposals came from J.D. Guttman (Guttman, 2002), that used authentication tests as building blocks for multi-party authentication protocols Guttman’s authentication tests were later used by H.J. Choi (Choi, 2006) to develop a framework for constructing security protocols based on predefined protocols

  • A. Datta et all (Datta et all, 2007) propose a method where

the composition process starts out from initial protocol equations and tries to reach the properties modeled by the final equations, corresponding to the composed protocol

  • S. Andova et all (Andova et all, 2008) propose a similar

method to A. Datta, however, in this case the properties are verified automatically using an existing tool

6 / 33

slide-7
SLIDE 7

Overview Introduction & Motivation Composition Experimental results Conclusion

Related work - security protocol composition (cont’d)

The solutions proposed by Guttman and Choi rely on predefined protocols, thus applying them in the composition

  • f existing protocols is not possible

The solutions proposed by Datta et all and Andova et all rely

  • n the user to construct the security protocol equations

The solution proposed by Andova et all is semi-automatic because only the verification phase uses an automatic protocol verification tool

7 / 33

slide-8
SLIDE 8

Overview Introduction & Motivation Composition Experimental results Conclusion

Protocol model

Basic sets:

P, N, K, C, M

Encryption functions:

FuncName ::= sk | pk | h | hmac

Terms:

T ::= . | R | N | K | C | M | (T, T) | {T}FuncName(T)

Nodes and chains:

σ, t, unde σ ∈ {+, −}, t ∈ T ±t1, ±t2, . . . , ±tn ∈ (±T)∗

Precondition-effect predicates:

CON CONF, CON KEYEXCHANGE . . . ∈ PR CC

Term type predicates:

TYPE DN, TYPE KSYM . . . ∈ PR TYPE

Participant and protocol models:

ς = prec, eff , type, gen, part, chain ∈ MPART {ς | ς ∈ MPART} ∈ MPROT

8 / 33

slide-9
SLIDE 9

Overview Introduction & Motivation Composition Experimental results Conclusion

Composition of preconditions and effects

Verifies that:

the knowledge required to run a given protocol, expressed through the form of precondition predicates, is available the set of precondition and effect predicates is non-destructive

The first condition is verified by applying the PART PREC predicate, defined for the ctx ∈ T∗ context as:

PART PREC(ctx, eff1, prec2) =    True, if eff1 ⊆ prec2∪ , {∪{CON TERM(t)|t ∈ ctx}} , False,

  • therwise .

The second condition is verified by applying the PART NONDESTR predicate, defined as:

PART NONDESTR(eff1, prec2, eff2) =            True, if EF1 = CON CONF∨ if EF1 = CON CONF ∧ t1 = t2 then ∃EF2(t2) : EF2 = CON CONF, ∀EF1(t1) ∈ eff1 ∧ ∀PR2(t2) ∈ prec2, False,

  • therwise.

9 / 33

slide-10
SLIDE 10

Overview Introduction & Motivation Composition Experimental results Conclusion

Composition of preconditions and effects (cont’d)

In order to denote the PE-composition of two participant or two protocol models, we use the following operators:

For participant models:

≺PE

ς

: MPART × MPART → MPART

For protocol models:

≺PE

ξ

: MPROT × MPROT → MPROT

By applying the ≺PE

ξ

  • perator on two protocol models ξ1

and ξ2, we have that:

ξ1 ≺PE

ξ

ξ2 = ξ2 ≺PE

ξ

ξ1

10 / 33

slide-11
SLIDE 11

Overview Introduction & Motivation Composition Experimental results Conclusion

Composition of protocol chains

Verifies if attacks can be constructed on each protocol by using terms extracted from the other protocols Such a method was proposed in our previous work (Genge 2007, Genge 2008) The condition we proposed through the form of a proposition, would provide protocol independence, meaning that composed protocols for which this condition is satisfied would maintain their security properties In order to prove the correctness of the proposition, we constructed a canonical protocol model, based on the presented protocol model

11 / 33

slide-12
SLIDE 12

Overview Introduction & Motivation Composition Experimental results Conclusion

Composition of protocol chains (cont’d)

In order to denote the PC-composition of participant and protocol models, we use the following operators:

For participant models:

≺PC

ς

: MPART × MPART → MPART

For protocol models:

≺PC

ξ

: MPROT × MPROT → MPROT

By applying the ≺PC

ξ

  • perator on two protocol models ξ1

and ξ2, we have that:

ξ1 ≺PC

ξ

ξ2 = ξ2 ≺PC

ξ

ξ1

If two protocol models can be composed PE and PC, then these can be composed using the following operator:

≺C : MPROT × MPROT → MPROT

12 / 33

slide-13
SLIDE 13

Overview Introduction & Motivation Composition Experimental results Conclusion

Security protocol specification

In order to test the proposed composition method, we first constructed a specification Each specification consists of several WSDL-S and OWL files:

  • ne WSDL-S and OWL file pair for each participant

Specifications were constructed according to the protocol model presented in this paper

13 / 33

slide-14
SLIDE 14

Overview Introduction & Motivation Composition Experimental results Conclusion

Part of Lowe’s BAN security protocol specification

Key exchange protocol Requires previous knowledge on the shared key Kab

14 / 33

slide-15
SLIDE 15

Overview Introduction & Motivation Composition Experimental results Conclusion

Part of Lowe’s BAN specification (cont’d)

Model protocol roles:

15 / 33

slide-16
SLIDE 16

Overview Introduction & Motivation Composition Experimental results Conclusion

Part of Lowe’s BAN specification (cont’d)

Model protocol roles: Model preconditions:

16 / 33

slide-17
SLIDE 17

Overview Introduction & Motivation Composition Experimental results Conclusion

Part of Lowe’s BAN specification (cont’d)

Model protocol roles: Model preconditions: Model initial terms and roles:

17 / 33

slide-18
SLIDE 18

Overview Introduction & Motivation Composition Experimental results Conclusion

Part of Lowe’s BAN specification (cont’d)

Model effects:

18 / 33

slide-19
SLIDE 19

Overview Introduction & Motivation Composition Experimental results Conclusion

Part of Lowe’s BAN specification (cont’d)

Model effects: Model message 1:

19 / 33

slide-20
SLIDE 20

Overview Introduction & Motivation Composition Experimental results Conclusion

Part of Lowe’s BAN specification (cont’d)

Model effects: Model message 1: Model message 2:

20 / 33

slide-21
SLIDE 21

Overview Introduction & Motivation Composition Experimental results Conclusion

Part of Lowe’s BAN specification (cont’d)

Model message 3:

21 / 33

slide-22
SLIDE 22

Overview Introduction & Motivation Composition Experimental results Conclusion

Part of Lowe’s BAN specification (cont’d)

Model message 3: Model message 4:

22 / 33

slide-23
SLIDE 23

Overview Introduction & Motivation Composition Experimental results Conclusion

Part of Lowe’s BAN specification (cont’d)

Model comm terms:

23 / 33

slide-24
SLIDE 24

Overview Introduction & Motivation Composition Experimental results Conclusion

Part of Lowe’s BAN specification (cont’d)

Model generated terms:

24 / 33

slide-25
SLIDE 25

Overview Introduction & Motivation Composition Experimental results Conclusion

Part of Lowe’s BAN specification (cont’d)

Model generated terms: Model discovered terms:

25 / 33

slide-26
SLIDE 26

Overview Introduction & Motivation Composition Experimental results Conclusion

Part of Lowe’s BAN specification (cont’d)

Model generated terms: Model discovered terms: Model previous terms:

26 / 33

slide-27
SLIDE 27

Overview Introduction & Motivation Composition Experimental results Conclusion

Service-oriented middleware

27 / 33

slide-28
SLIDE 28

Overview Introduction & Motivation Composition Experimental results Conclusion

Composition results

Table: Protocol composition results

Protocol 1 Protocol 2 Precondition-Effect Protocol-Chain Validation: (S1/S2) (S1/S2) Scyther Lowe-B ISO9798 N/Y Y/Y Y/Y Lowe-B X509v1 N/N Y/Y Y/Y ISO9798 X509v1 Y/Y Y/Y Y/Y ISO9798 X509v1c Y/Y Y/Y Y/Y X509v1 X509v1c Y/Y Y/Y Y/Y X509v1 X509v1c Y/Y Y/Y Y/Y BAN-RPC Lowe-B Y/Y N/N N/N L-D-S K-Cv1 Y/Y N/N N/N K-Cv1 K-Cv2 Y/Y Y/Y Y/Y L-D-S Kerbv5 Y/Y N/N N/N Lowe-Kerb Neuman-S Y/Y N/N N/N H-N-S Neuman-S Y/Y Y/Y Y/Y Needh-S X509v1 Y/N Y/Y Y/Y L-N-S ISO9798 Y/N Y/Y Y/Y Otway-R Lowe-B Y/N Y/Y Y/Y SPLICE Needh-S Y/Y Y/Y Y/Y TMN Andr-RPC Y/N Y/Y Y/Y Y-L K-Cv1 Y/Y N/N N/N 28 / 33

slide-29
SLIDE 29

Overview Introduction & Motivation Composition Experimental results Conclusion

Composition of video services

29 / 33

slide-30
SLIDE 30

Overview Introduction & Motivation Composition Experimental results Conclusion

Composition of video services (cont’d)

Performance of composition modules

Composition time of 4 resources Composition time of 50 resources

30 / 33

slide-31
SLIDE 31

Overview Introduction & Motivation Composition Experimental results Conclusion

Composition of video services (cont’d)

Total accessing time of composed resources

Accessing time for up to 50 resources

31 / 33

slide-32
SLIDE 32

Overview Introduction & Motivation Composition Experimental results Conclusion

Conclusion and future work

We developed a method for the composition of security protocols The novelty of our approach is the fact that it provides a syntactical verification of the involved protocols, that makes it appropriate for on-line automated composition applications The proposed method was used in the process of automated composition of security protocols for Web services As future work, we intend to use the proposed composition method in the design process of new protocols for Web services ⇒ This would allow us to implement more complex protocols, such as TLS, currently used as a binary security protocol, in XML message format

32 / 33

slide-33
SLIDE 33

Overview Introduction & Motivation Composition Experimental results Conclusion

Thanks for your attention! Questions?

33 / 33