Formal methods for security protocol

1
Formal Methods for Security Protocol
1. Introduction
Security protocols use cryptographic primitives as build blocks in order to achieve
security goals such as the authentications, confidentiality and the integrity. Cryptographic
primitive are from the perspective of a software developer in atomic cryptographic
operations. They are number of hashing operations which are being used to safeguard
information such as the MD5, SHA-1, SHA-256, SHA-512 are the most common used.
They are other types of the cryptographic operations which are also used these includes
symmetric schemes such as the AES, asymmetric like public key systems and the digital
signatures like the HMACs. The security protocols are well known to be difficult for one
to get right. They are many protocols which are proposed by different kind of the literature
while as many protocols are exploited in the practice and they are turned and they are
flawed but since their well functions ware made on the base implicit assumptions.
They are number of approaches which have been put a place for formal verifications
of the security protocols in order to overcome the problems of faulty implementations and
hidden requirements. They are number of methods used for the formal verifications of the
security protocols such as the BAN- logic, strand spaces and the Casper/ FDR-approaches.
All those three methods plus other not mentioned they abstract a way from cryptographic
details. Never the less they take for granted that other suitable cryptographic primitives
such as the decryption and encryptions, verifications and the digital signatures are given
and they are cryptographic safe. Putting into consideration that no software or application
2
should be developed and commercialized pre the crypto analytic evaluation is carried out
in the algorithms have been accessed and the subsequent analytical is weighted in all
aspects.
Formal verifications is the use of the mathematical techniques that ensures that the
design conforms to some precisely expressed in the notion of the correctness. In previous
years security protocols had be design to and then analyzed heuristically. Failure to conduct
and implement formal methods of the verification could result to security errors which may
remain undetected. In formal verifications techniques also provides the sequential way of
discovering protocol flaws. They are also used to design and also describe the so many way
of obstruction starting from the gate level, to RTL implementations and in other cases it is
used even at the transaction level models elaborated in the standardized programming
languages. Beyond other factors such as the conformity of the correctness they are other
formal methods when in cooperated with the design phases of the system development thus
results into more accurate and the lower cost of the systems.
It is unfortunate all those protocols verification methodologies are very complicated
and such cannot be implemented by the protocol engineers. There is a huge gap in respect
to the academic research about ways of verification techniques and their functionality in
evaluating the prospective design and the implementation flaws in complicated systems.
In discipline to these paper, it is intended to extant, analyze and also compare the man
prevalent approaches in accordance to the formal verifications of the security protocols.
3
They are four well known verifications approaches: sequential programming approach,
logical programming approach, the strand spaces approach, the belief based approach
The four broader domain fall under the model checking and logical interference. Each and
every mentioned methodologies are all inclusive in the Needham Schroeder public protocol
for Lowes attack. On this paper we only focus on three main approaches.
2. The BAN-Logic
The BAN Logic it is one of the methods used in analysis of the cryptographic protocols.
The main factor of it is to show how the methods works and applied. Even though the
method can be easily be applied while giving quick insight in the working of the protocols.
The method was developed by the Burrows Abadi and Needham for analyzing
authentications of the protocols. In discipline the logic are public thus shares the key
primitive which are formalized and also a notion of a fresh message. The BAN logic can
also be used in answering some of the basics assumptions such as the does the logic uses
unnecessary actions of which can be left out or does the protocol encrypt anything which
can be either be sent without necessary weakening the security. The last factor to consider
is what are the assumptions which are needed for this protocol.
The BAN logic makes it possible to reason with a simple way over the cryptographic in a
formal way. In the basic of the logic is to belief of a party in the reality of the formula.
Formula they don’t have to be true but in general have a sense of truth.
4
Notation
Notations shows the syntax of the BAN logic. They are number of symbols which are
omitted by the most common symbols are given here and described. They are other
syntactical rules of the Burrows, Abdi and Needham.
Q believes that Z holds: Q |≡ Z. This means that Z believes that the current run of the
protocols that the formula Z is true. One can not conclude that Z is either valid
Q sees the formula 𝒁: 𝑷⨞ 𝒁 thus can be said that Z is true. This is not true that Z is a
correct truth it only shows what Q believes.
Idealization
5
6
7
8
Within the logic, statements can be either be formulated with the current run of the protocols
on the weaken network

Place new order. It's free, fast and safe

-+
550 words

Our customers say

Customer Avatar
Jeff Curtis
USA, Student

"I'm fully satisfied with the essay I've just received. When I read it, I felt like it was exactly what I wanted to say, but couldn’t find the necessary words. Thank you!"

Customer Avatar
Ian McGregor
UK, Student

"I don’t know what I would do without your assistance! With your help, I met my deadline just in time and the work was very professional. I will be back in several days with another assignment!"

Customer Avatar
Shannon Williams
Canada, Student

"It was the perfect experience! I enjoyed working with my writer, he delivered my work on time and followed all the guidelines about the referencing and contents."

  • 5-paragraph Essay
  • Admission Essay
  • Annotated Bibliography
  • Argumentative Essay
  • Article Review
  • Assignment
  • Biography
  • Book/Movie Review
  • Business Plan
  • Case Study
  • Cause and Effect Essay
  • Classification Essay
  • Comparison Essay
  • Coursework
  • Creative Writing
  • Critical Thinking/Review
  • Deductive Essay
  • Definition Essay
  • Essay (Any Type)
  • Exploratory Essay
  • Expository Essay
  • Informal Essay
  • Literature Essay
  • Multiple Choice Question
  • Narrative Essay
  • Personal Essay
  • Persuasive Essay
  • Powerpoint Presentation
  • Reflective Writing
  • Research Essay
  • Response Essay
  • Scholarship Essay
  • Term Paper
We use cookies to provide you with the best possible experience. By using this website you are accepting the use of cookies mentioned in our Privacy Policy.