计算机应用 ›› 2015, Vol. 35 ›› Issue (7): 1870-1876.DOI: 10.11772/j.issn.1001-9081.2015.07.1870

• 信息安全 • 上一篇    下一篇

基于串空间理论的安全协议自动验证

刘家芬1,2   

  1. 1. 西南财经大学 经济信息工程学院, 成都 610054;
    2. 西南财经大学 四川省金融智能与金融工程重点实验室, 成都 610054
  • 收稿日期:2015-01-30 修回日期:2015-03-26 出版日期:2015-07-10 发布日期:2015-07-17
  • 通讯作者: 刘家芬(1980-),女,湖北荆州人,副教授,博士,CCF高级会员,主要研究方向:信息安全、智能信息处理,jfliu@swufe.edu.cn
  • 基金资助:

    国家自然科学基金重大项目(91218301);国家自然科学基金青年项目(60903201);中央高校基本科研业务费研究项目(JBK20505, JBK140129)。

Automatic verification of security protocols with strand space theory

LIU Jiafen1,2   

  1. 1. School of Economic Information Engineering, Southwestern University of Finance and Economics, Chengdu Sichuan 610054, China;
    2. Key Laboratory of Financial Intelligence and Financial Engineering of Sichuan, Southwestern University of Finance and Economics, Chengdu Sichuan 610054, China
  • Received:2015-01-30 Revised:2015-03-26 Online:2015-07-10 Published:2015-07-17

摘要:

针对目前串空间理论依赖分析人员主观判断、无法使用自动化工具进行验证的问题,提出了基于串空间理论的协议认证属性标准化验证过程。首先为协议消息项定义类型标签,对串空间及认证测试理论进行扩展;然后通过判断测试元素出现位置、检验测试元素参数一致性、确认变换进行边唯一存在性和检验目标串参数一致性,将基于串空间理论的协议验证过程标准化为可程序实现的步骤。该算法的时间复杂度为O(n2),避免了模型检测方法的状态空间爆炸问题,并在此基础上实现了安全协议认证属性的自动化验证工具。以BAN-Yahalom协议和TLS 1.0握手协议为例进行了标准化的分析验证,找到了对BAN-Yahalom协议的一种新攻击形式。该攻击无需限制服务器对随机数的检查,比Syverson发现的攻击更具普遍性。

关键词: 串空间, 认证测试, 安全协议, 自动化验证, 认证属性, BAN-Yahalom协议, 安全传输层握手协议

Abstract:

Strand space theory relies on individual judgments and subjective experiences much, and can hardly be automated. To solve this problem, a more formal and objective verification process based on strand space theory and authentication test was proposed. First, a set of type labels was defined for terms of protocol to expand strand space and authentication test theory. By listing all possible occurrences of test instances, checking agreement of arguments in test component, verifying uniqueness of transforming edge, examining agreement of arguments in goal strand, protocols verification process based on strand space could be formalized to a series of programmable procedures. Time complexity of the whole verification algorithm is O(n2), hence state space explosion problem common in state space search was avoided. On the basis of theoretical study, an automatic tool was implemented to verify authentication attributes of security protocols automatically. BAN-Yahalom protocol and TLS handshake protocol 1.0 were analyzed as examples, where a new attack to BAN-Yahalom was found. It is similar to Syverson's attack, but it has no restriction on server's verification of nonce, hence has more general application scenario than Syverson's.

Key words: strand space, authentication test, security protocol, automatic verification, authentication property, BAN-Yahalom protocol, Transport Layer Security (TLS) handshake protocol

中图分类号: