comparing state spaces in automatic security protocol
play

Comparing State Spaces in Automatic Security Protocol Verification - PowerPoint PPT Presentation

Comparing State Spaces in Automatic Security Protocol Verification Comparing State Spaces in Automatic Security Protocol Verification Pascal Lafourcade & Cas Cremers Comparing State Spaces in Automatic Security Protocol Verification


  1. Comparing State Spaces in Automatic Security Protocol Verification Comparing State Spaces in Automatic Security Protocol Verification Pascal Lafourcade & Cas Cremers

  2. Comparing State Spaces in Automatic Security Protocol Verification Motivations Cryptographic Protocols

  3. Comparing State Spaces in Automatic Security Protocol Verification Motivations Cryptographic Protocols

  4. Comparing State Spaces in Automatic Security Protocol Verification Motivations Cryptographic Protocols

  5. Comparing State Spaces in Automatic Security Protocol Verification Motivations Information Security Everywhere • The world is distributed and based on networked information systems. • Protocols essential to developing networked services and new applications. Security errors in protocol design are costly

  6. Comparing State Spaces in Automatic Security Protocol Verification Motivations Example: Needham-Schroeder Protocol 1978

  7. Comparing State Spaces in Automatic Security Protocol Verification Motivations Example: Needham-Schroeder Protocol 1978

  8. Comparing State Spaces in Automatic Security Protocol Verification Motivations Example: Needham-Schroeder Protocol 1978

  9. Comparing State Spaces in Automatic Security Protocol Verification Motivations Example: Needham-Schroeder Protocol 1978 { N A , N B } K A { N A , A } K B { N B } K B

  10. Comparing State Spaces in Automatic Security Protocol Verification Motivations Example: Needham-Schroeder Protocol 1978 { N A , N B } K A { N A , A } K B { N B } K B

  11. Comparing State Spaces in Automatic Security Protocol Verification Motivations Lowe Attack on the Needham-Schroeder so-called “Man in the middle attack”

  12. Comparing State Spaces in Automatic Security Protocol Verification Motivations Lowe Attack on the Needham-Schroeder so-called “Man in the middle attack”

  13. Comparing State Spaces in Automatic Security Protocol Verification Motivations Lowe Attack on the Needham-Schroeder so-called “Man in the middle attack”

  14. Comparing State Spaces in Automatic Security Protocol Verification Motivations Lowe Attack on the Needham-Schroeder so-called “Man in the middle attack”

  15. Comparing State Spaces in Automatic Security Protocol Verification Motivations Lowe Attack on the Needham-Schroeder so-called “Man in the middle attack”

  16. Comparing State Spaces in Automatic Security Protocol Verification Motivations Lowe Attack on the Needham-Schroeder so-called “Man in the middle attack”

  17. Comparing State Spaces in Automatic Security Protocol Verification Motivations Lowe Attack on the Needham-Schroeder so-called “Man in the middle attack”

  18. Comparing State Spaces in Automatic Security Protocol Verification Motivations Necessity of Tools • Protocols are small recipes. • Non trivial to design and understand. • The number and size of new protocols. • Out-pacing human ability to rigourously analyze them. GOAL : A tool is finding flaws or establishing their correctness. • completely automated,

  19. Comparing State Spaces in Automatic Security Protocol Verification Motivations How can we compare all these tools “fairly”? State of the art • Time performence comparison of AVISPA Tools L. Vigano “Automated Security Protocol Analysis With the AVISPA Tool” ENTCS 2006. • Usability comparison between AVISPA

  20. Comparing State Spaces in Automatic Security Protocol Verification Motivations Outline 1 Motivations 2 State Spaces Notations Results 3 Settings Tools Protocols and PC

  21. Comparing State Spaces in Automatic Security Protocol Verification State Spaces Outline 1 Motivations 2 State Spaces Notations Results 3 Settings Tools Protocols and PC

  22. Comparing State Spaces in Automatic Security Protocol Verification State Spaces Notations Terminology • A run is a single (possibly partial) instance of a role, performed by an agent. • A run description of a protocol with | R | roles is a set of roles. An element of a run description is of the form r ( a 1 , a 2 , . . . , a | R | ), where r denotes the role that the run is performing. • A Scenario is a multiset of run

  23. Comparing State Spaces in Automatic Security Protocol Verification State Spaces Notations Definitions and Properties (I) Let n be an integer, and let s be a scenario. • Traces is the set of all traces (possible executions of the protocol) of any length, and any combination of agents. • MaxRuns(n) is the set of traces with at most n runs. ∀ n ∈ N : MaxRuns( n ) ⊂ Traces (1)

  24. Comparing State Spaces in Automatic Security Protocol Verification State Spaces Results Definitions and Properties (II) • RepScen(s) is the set of traces built only with runs that are present in s . The runs defined by the scenario s can be executed any number of times. In other words, each run in each trace corresponds to an element of s .

  25. Comparing State Spaces in Automatic Security Protocol Verification State Spaces Results Number of Agents According to [Comon & Cortier 2004] • Only a single dishonest (compromised) agent e , is enough. • For the verification of secrecy, only a single honest agent a is sufficient. • For the verification of authentication, we

  26. Comparing State Spaces in Automatic Security Protocol Verification State Spaces Results Minimal Number of Scenarios With 2 agents and 1 intruder for X ( a 1 , . . . , a | R | ), we get | R | ∗ 2 ∗ 3 ( | R |− 1) different possible run descriptions. Now we choose a multiset of n run descriptions: � | R | ∗ 2 ∗ 3 ( | R |− 1) + n − 1 � n

  27. Comparing State Spaces in Automatic Security Protocol Verification State Spaces Results Using Burnside Lemma • { a → a , b → b } (the trivial renaming) • { a → b , b → a } We get � | R |∗ 3 ( | R |− 1) + n � 2 ∗| R |∗ 3 ( | R |− 1) + n − 1 2 − 1 � � + ǫ n n n 2 k ( n , | R | ) = 2

  28. Comparing State Spaces in Automatic Security Protocol Verification Settings Outline 1 Motivations 2 State Spaces Notations Results 3 Settings Tools Protocols and PC

  29. Comparing State Spaces in Automatic Security Protocol Verification Settings Tools 6 Tools Compared • Avispa : OFMC: On-the-fly Model-Checker employs several symbolic techniques to explore the state space in a demand-driven way. CL-AtSe: Constraint-Logic-based Attack Searcher applies constraint solving with simplification heuristics and redundancy elimination techniques. SATMC: SAT-based Model-Checker builds a propositional formula encoding all the

  30. Comparing State Spaces in Automatic Security Protocol Verification Settings Protocols and PC 4 Protocols analyzed • Needham-Schroeder • Needham-Schroeder Lowe • EKE: Encrypted Key Exchange (using symetric and asymetric encryption) • TLS: Transport Layer Security (larger protocol)

  31. Comparing State Spaces in Automatic Security Protocol Verification Settings Protocols and PC EKE 0. A->B: {Ea}_Kab | Key exchange part 1. B->A: {{K}_Ea}_Kab | 2. A->B: {Ca}_K | 3. B->A: {Ca,Cb}_K | Challenge/Response 4. A->B: {Cb}_K | Authentication part TLS 0. A->B: A, Na, Sid, Pa | Pa is a cryptosuite offer 1. B->A: Nb, Sid, Pb | Pb is B’s counteroffer

  32. Comparing State Spaces in Automatic Security Protocol Verification Results Outline 1 Motivations 2 State Spaces Notations Results 3 Settings Tools Protocols and PC

  33. Comparing State Spaces in Automatic Security Protocol Verification Results Secrecy

  34. Comparing State Spaces in Automatic Security Protocol Verification Results Secrecy Needham-Schroeder-Lowe : secrecy of na and nb for A,B 1000 Casper/FDR CL-Atse OFMC ProVerif Sat-MC Scyther TA4SP 100 time (s) 10

  35. Comparing State Spaces in Automatic Security Protocol Verification Results Secrecy EKE : secrecy of k for A,B timeout Casper/FDR CL-Atse OFMC 1000 ProVerif Sat-MC Scyther TA4SP 100 time (s) 10

  36. Comparing State Spaces in Automatic Security Protocol Verification Results Secrecy TLS : secrecy of ck and sk for A,B timeout CL-Atse OFMC ProVerif Sat-MC 1000 Scyther TA4SP 100 time (s) 10

  37. Comparing State Spaces in Automatic Security Protocol Verification Results Authentication Needham-Schroeder : authentication of A,B timeout Casper/FDR CL-Atse OFMC 1000 ProVerif Sat-MC Scyther 100 time (s) 10

  38. Comparing State Spaces in Automatic Security Protocol Verification Results Authentication Needham-Schroeder-Lowe : authentication of A,B timeout Casper/FDR CL-Atse OFMC 1000 ProVerif Sat-MC Scyther 100 time (s) 10

  39. Comparing State Spaces in Automatic Security Protocol Verification Results Authentication EKE : authentication of A,B timeout Casper/FDR CL-Atse OFMC 1000 ProVerif Sat-MC Scyther 100 time (s) 10

  40. Comparing State Spaces in Automatic Security Protocol Verification Results Authentication TLS : authentication of A,B timeout CL-Atse OFMC Sat-MC 1000 Scyther 100 time (s) 10

  41. Comparing State Spaces in Automatic Security Protocol Verification Conclusion & Perspective Outline 1 Motivations 2 State Spaces Notations Results 3 Settings Tools Protocols and PC

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend