Secrecy Analysis of Security Protocol Based on Reachability Relation

Yong-Gen GU,Yu-Xi FU,Han ZHU
DOI: https://doi.org/10.3321/j.issn:0254-4164.2007.02.012
2007-01-01
Jisuanji Xuebao/Chinese Journal of Computers
Abstract:The analysis and verification of security protocols are very important techniques to guarantee the security properties and the application requirements. Formal methods and automated tools are both necessary and efficient for these purposes. Security protocols are typical distributed concurrent systems, while process calculus is a powerful tool to model distributed concurrent systems. With strong ability of description and formal semantics, process calculus can precisely characterize the interaction between different participants of a security protocol. However, it inherently lack support of data structure. So the authors add a message inference system into process calculus. In this paper, a formal model is proposed for the secrecy analysis of security protocols based on process calculus with message inference. Using this model, the authors define two concepts: one-step reachability and multi-step reachability. Secrecy property can be formally defined and analyzed based on these reachability relations. By a case of study, the authors analyze the TMN protocol in the model. At last, the future direction to perfect the model is pointed.
What problem does this paper attempt to address?