Visible to the public On the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions

TitleOn the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions
Publication TypeConference Paper
Year of Publication2019
AuthorsFattahi, Jaouhar, Mejri, Mohamed, Pricop, Emil
Conference Name2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE)
PublisherIEEE
ISBN Number978-1-7281-0319-8
KeywordsCollaboration, composability, compositionality, cryptographic protocols, Encryption, formal verification, Needham-Schroeder symmetric-key protocol, Policy Based Governance, policy-based governance, privacy, protocol verification, pubcrawl, reliability, security, security of data, security vulnerability, telecommunication security, Waste materials, witness functions
Abstract

In this paper, we show how practical the little theorem of witness functions is in detecting security flaws in some categories of cryptographic protocols. We convey a formal analysis of the Needham-Schroeder symmetric-key protocol in the theory of witness functions. We show how it helps to warn about a security vulnerability in a given step of this protocol where the value of security of a sensitive ticket in a sent message unexpectedly decreases compared with its value when received. This vulnerability may be exploited by an intruder to mount a replay attack as described by Denning and Sacco.

URLhttps://ieeexplore.ieee.org/document/8861950
DOI10.1109/CCECE.2019.8861950
Citation Keyfattahi_security_2019