Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Using CSP to Detect Errors in the TMN Protocol
Lowe G., Roscoe B. IEEE Transactions on Software Engineering23 (10):659-669,1997.Type:Article
Date Reviewed: Aug 1 1998

The first successful application of general-purpose model-checking tools to analysis of the security of cryptographic protocols was achieved by the second author [1]. This paper is important in that it seems to be the first exposition of this technique in an archival journal. It is reasonably self-contained, but the reader will have to look elsewhere for an introduction to the cryptographic protocol failure problem. Model-checking is most easily applied to secrecy goals and often assumes that keys are primitive, but this paper shows how it can handle authentication goals and the combination of two keys with a bitwise exclusive-or. The results of the FDR analysis are compared favorably with known prior analyses of the protocol.

The tool used is FDR, which accepts a machine-readable version of C.A. R. Hoare’s communicating sequential processes (CSP) process algebra, for system specifications. While CSP takes some effort to read, the authors have taken care to explain their use of it. Different versions of the protocol specification are used to uncover different attacks. The analysis also requires a model of the hostile network environment, containing an intruder who can intercept and fake messages. Security failures are encoded as special messages generated by the intruder. The tool runs automatically, exploring a finite part of the state space, covering about 4,000 states in about two minutes for this  example.  This approach is therefore a practical technique that helps to locate flaws in a protocol design, though failure to find an attack does not by itself prove that a protocol is secure.

Reviewer:  Jon Millen Review #: CR121612 (9808-0599)
1) Roscoe, A. W. Modeling and verifying key-exchange protocols using CSP and FDR. In Proceedings of 1995 IEEE Computer Security Foundations. IEEE Computer Society Press, Washington, 1995.
Bookmark and Share
  Featured Reviewer  
 
Protocol Verification (C.2.2 ... )
 
 
Csp (D.1.3 ... )
 
 
Csp (D.3.2 ... )
 
 
Design Studies (C.4 ... )
 
 
Concurrent Programming (D.1.3 )
 
 
Language Classifications (D.3.2 )
 
  more  
Would you recommend this review?
yes
no
Other reviews under "Protocol Verification": Date
Design and validation of computer protocols
Holzmann G. (ed), Prentice-Hall, Inc., Upper Saddle River, NJ, 1991. Type: Book (9780135399255)
Jul 1 1992
Improving round-trip time estimates in reliable transport protocols
Karn P., Partridge C. ACM Transactions on Computer Systems 9(4): 364-373, 1991. Type: Article
Aug 1 1992
Algebraic specification and verification of communication protocols
Koomen C. Science of Computer Programming 5(1): 1-36, 1985. Type: Article
Nov 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy