Using first-order theorem provers for security protocol verification

In today’s computer-dominated world, cryptographic security protocols are exceptionally important in ensuring secure communication over an insecure network. Hence, this has led to much research in this field, leading to security protocols being developed and deployed. However, a majority of these ex...

Full description

Saved in:
Bibliographic Details
Main Author: Lim, Pamela Jiah Min
Other Authors: Alwen Fernanto Tiu
Format: Final Year Project
Language:English
Published: 2015
Subjects:
Online Access:http://hdl.handle.net/10356/62870
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-62870
record_format dspace
spelling sg-ntu-dr.10356-628702023-03-03T20:24:28Z Using first-order theorem provers for security protocol verification Lim, Pamela Jiah Min Alwen Fernanto Tiu School of Computer Engineering DRNTU::Engineering::Computer science and engineering In today’s computer-dominated world, cryptographic security protocols are exceptionally important in ensuring secure communication over an insecure network. Hence, this has led to much research in this field, leading to security protocols being developed and deployed. However, a majority of these existing protocols have been found to contain vulnerabilities after deployment. Even with the knowledge of such vulnerabilities, insecure protocols are still being created. This could be due to the difficulty faced by developers in checking for flaws in the protocols. It remains a difficult task to analyze cryptographic security protocols manually. This project aims to tackle this problem by running security protocols modeled in First-Order Logic through dedicated theorem provers such as Proverif, and fullfledged theorem provers like Vampire. Proverif makes use of a weak attacker model, Dolev-Yao model, which leads to attacks undetected. Although a richer attacker model is used for Vampire, it may not necessary be more efficient than Proverif. Hence, the theorem provers’ efficiencies are analyzed and compared. The outcome of the project shows that both Proverif and Vampire are almost as capable in analyzing security protocols, since there remain protocols that Proverif can detect while Vampire could not, and vice versa. Thus, it can be concluded that there is no clear winner in terms of performance, and the best result is only achieved when the provers are used in parallel. Bachelor of Engineering (Computer Science) 2015-04-30T04:20:18Z 2015-04-30T04:20:18Z 2015 2015 Final Year Project (FYP) http://hdl.handle.net/10356/62870 en Nanyang Technological University 78 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Computer science and engineering
spellingShingle DRNTU::Engineering::Computer science and engineering
Lim, Pamela Jiah Min
Using first-order theorem provers for security protocol verification
description In today’s computer-dominated world, cryptographic security protocols are exceptionally important in ensuring secure communication over an insecure network. Hence, this has led to much research in this field, leading to security protocols being developed and deployed. However, a majority of these existing protocols have been found to contain vulnerabilities after deployment. Even with the knowledge of such vulnerabilities, insecure protocols are still being created. This could be due to the difficulty faced by developers in checking for flaws in the protocols. It remains a difficult task to analyze cryptographic security protocols manually. This project aims to tackle this problem by running security protocols modeled in First-Order Logic through dedicated theorem provers such as Proverif, and fullfledged theorem provers like Vampire. Proverif makes use of a weak attacker model, Dolev-Yao model, which leads to attacks undetected. Although a richer attacker model is used for Vampire, it may not necessary be more efficient than Proverif. Hence, the theorem provers’ efficiencies are analyzed and compared. The outcome of the project shows that both Proverif and Vampire are almost as capable in analyzing security protocols, since there remain protocols that Proverif can detect while Vampire could not, and vice versa. Thus, it can be concluded that there is no clear winner in terms of performance, and the best result is only achieved when the provers are used in parallel.
author2 Alwen Fernanto Tiu
author_facet Alwen Fernanto Tiu
Lim, Pamela Jiah Min
format Final Year Project
author Lim, Pamela Jiah Min
author_sort Lim, Pamela Jiah Min
title Using first-order theorem provers for security protocol verification
title_short Using first-order theorem provers for security protocol verification
title_full Using first-order theorem provers for security protocol verification
title_fullStr Using first-order theorem provers for security protocol verification
title_full_unstemmed Using first-order theorem provers for security protocol verification
title_sort using first-order theorem provers for security protocol verification
publishDate 2015
url http://hdl.handle.net/10356/62870
_version_ 1759853318660685824