1996
DOI: 10.1007/3-540-61042-1_43
|View full text |Cite
|
Sign up to set email alerts
|

Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR

Abstract: In this paper we analyse the well known Needham-Schroeder Public-Key Protocol using FDR, a refinement checker for CSP. We use FDR to discover an attack upon the protocol, which allows an intruder to impersonate another agent. We adapt the protocol, and then use FDR to show that the new protocol is secure, at least for a small system. Finally we prove a result which tells us that if this small system is secure, then so is a system of arbitrary size.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
674
0
1

Year Published

2006
2006
2013
2013

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 755 publications
(678 citation statements)
references
References 9 publications
3
674
0
1
Order By: Relevance
“…Indeed, any enrichment in the symbolic model would translate to an analogous enrichment in the definition of simple protocols, while preserving the validity of the treatment.) We note that, while restricted, this format is still very meaningful; in particular, it allows expressing known 'benchmark' protocols such as several variants of the Needham-Schroeder-Lowe (NSL) protocol [47,35,36], and the Dwork-Dolev-Naor [23] protocol.…”
Section: Generalmentioning
confidence: 99%
See 1 more Smart Citation
“…Indeed, any enrichment in the symbolic model would translate to an analogous enrichment in the definition of simple protocols, while preserving the validity of the treatment.) We note that, while restricted, this format is still very meaningful; in particular, it allows expressing known 'benchmark' protocols such as several variants of the Needham-Schroeder-Lowe (NSL) protocol [47,35,36], and the Dwork-Dolev-Naor [23] protocol.…”
Section: Generalmentioning
confidence: 99%
“…Indeed, protocol analysis in these models is much simpler, more mechanical, and amenable to automation (see e.g. [36,39,53,46,11]). These are desirable properties when attempting to analyze large-scale systems.…”
Section: Introductionmentioning
confidence: 99%
“…Possible approaches generally used in the verification of cryptographic protocols are model-checking ( [Low96], [BMV03]) or interactive verification ( [Pau98], [Eva03]). Paulson's inductive approach has proven to be especially powerful by tackling complex industrial protocols ( [Pau01]).…”
Section: A Security Model For Mondex Pursesmentioning
confidence: 99%
“…For example, the non-injective agreement property [21]: "For certain data items ds, if each time a principal B completes a run of the protocol as responder using ds, apparently with A, then there is a unique run of the protocol with the principal A as initiator using ds, apparently with B." The generated protocols could be re-analysed using more sophisticated protocol analysis tools, such as the NRL Analyzer [23], the Interrogator model [24], FDR [20], Murϕ [25], Athena [33]. In this case, the Protocol Selector of ASPB would be used to narrow down the set of candidate protocols to be verified.…”
Section: The Protocol Selectormentioning
confidence: 99%
“…The heuristics are also augmented by extending protocol selection/design strategies [16,21,22] in order to restrict the generated protocols to a collection of candidate protocols that are likely to be secure. While the collection of candidate protocols are secure under the BSW-ZF logic, the intention is that more sophisticated protocol analysis tools, such as [20,[23][24][25], are then used to select appropriate protocols from the collection.…”
Section: Introductionmentioning
confidence: 99%