Optimization of ProVerif Programs for AKE Protocols (original) (raw)
Abstract
Cryptographic protocols are used to establish secure connection between agents who communicate strictly in accordance with the rules specified by the protocol. To make sure that a newly designed cryptographic protocol is cryptographically strong, various software tools are usually employed. However, an adequate specification of a cryptographic protocol is generally represented as a set of requirements for sequences of transmitted messages, including their format. The fulfillment of all these requirements leads to the fact that the formal specification of a real-world cryptographic protocol becomes cumbersome and, therefore, difficult to analyze by formal methods. ProVerif is one of the intensively developed tools for formal verification of cryptographic protocols. However, ProVerif often fails to analyze large protocols, i.e., it can neither prove the security of the protocol nor refute it. In these cases, either the problem is approximated or equivalent transformations of a program model in the ProVerif language are carried out to simplify the ProVerif model. In this paper, we propose a technique to simplify ProVerif specifications for AKE protocols that use the ElGamal encryption scheme. In particular, we define equivalent transformations that make it possible to construct a ProVerif specification that facilitates the analysis for the ProVerif tool. Experimental results for the Needham–Schroeder and Yahalom cryptoprotocols show that this approach is promising for automatic verification of real-world protocols.
Access this article
Subscribe and save
- Starting from 10 chapters or articles per month
- Access and download chapters and articles from more than 300k books and 2,500 journals
- Cancel anytime View plans
Buy Now
Price excludes VAT (USA)
Tax calculation will be finalised during checkout.
Instant access to the full article PDF.
Similar content being viewed by others
REFERENCES
- Blanchet, B., Symbolic and computational mechanized verification of the ARINC823 avionic protocols, Proc. 30th IEEE Computer Security Foundations Symp. (CSF), 2017, pp. 68–82.
- Bhargavan, K., Blanchet, B., and Kobeissi, N., Verified models and reference implementations for the TLS 1.3 standard candidate, Research Report RR-9040, Inria, 2017.
- Bhargavan, K., Blanchet, B., and Kobeissi, N., Verified models and reference implementations for the TLS 1.3 standard candidate, Proc. IEEE Symp. Security and Privacy (S&P), pp. 483–503.
- Meier, S., Schmidt, B., et al., The TAMARIN prover for the symbolic analysis of security protocols, Proc. 25th Int. Conf. Computer Aided Verification, 2013, pp. 696–701.
- Meier, S., Advancing automated security protocol verification, PhD Thesis, ETH Zurich, 2013.
- Schmidt, B., Formal analysis of key exchange protocols and physical protocols, PhD Thesis, ETH Zurich, 2012.
- Blanchet, B., Modeling and verifying security protocols with the applied pi calculus and ProVerif, Found. Trends Privacy Secur., 2016, vol. 1, nos. 1–2, pp. 1–135.
Article Google Scholar - Blanchet, B., Automatic verification of correspondences for security protocols, J. Comput. Secur., 2009, vol. 17, no. 4, pp. 363–434.
Article Google Scholar - Blanchet, B., Automatic verification of security protocols in the symbolic model: The verifier ProVerif, Lect. Notes Comput. Sci., 2012, vol. 8604, pp. 54–87.
Article MATH Google Scholar - Blanchet, B., CryptoVerif: A computationally sound mechanized prover for cryptographic protocols, Proc. Dagstuhl Seminar on Formal Protocol Verification Applied, 2007.
- Elgamal, T., A public-key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inf. Theory, 1985, vol. 31, no. 4, pp. 469–472.
Article MathSciNet MATH Google Scholar - Vinarskii, E., Proverif_code_optimisation. https://github.com/vinevg1996/proverif\_code\_optimisation. Accessed October 24, 2021.
Funding
This work was supported by the Ministry of Education and Science of the Russian Federation, grant no. 075-15-2020-788.
Author information
Authors and Affiliations
- Ivannikov Institute for System Programming, Russian Academy of Sciences, ul. Solzhenitsyna 25, 109004, Moscow, Russia
E. M. Vinarskii & A. V. Demakov - National Research University Higher School of Economics, Pokrovskii bul’v. 11, 109028, Moscow, Russia
E. M. Vinarskii
Authors
- E. M. Vinarskii
- A. V. Demakov
Corresponding authors
Correspondence toE. M. Vinarskii or A. V. Demakov.
Additional information
Translated by Yu. Kornienko
Rights and permissions
About this article
Cite this article
Vinarskii, E.M., Demakov, A.V. Optimization of ProVerif Programs for AKE Protocols.Program Comput Soft 48, 781–787 (2022). https://doi.org/10.1134/S0361768822080035
- Received: 12 January 2022
- Revised: 16 February 2022
- Accepted: 22 March 2022
- Published: 21 December 2022
- Version of record: 21 December 2022
- Issue date: December 2022
- DOI: https://doi.org/10.1134/S0361768822080035