CSE 914 - Michigan State University Extensions of BAN by Heather Goldsby Michelle Pirtle.

Slides:



Advertisements
Similar presentations
25 February 2009Instructor: Tasneem Darwish1 University of Palestine Faculty of Applied Engineering and Urban Planning Software Engineering Department.
Advertisements

Non-monotonic Properties for Proving Correctness in a Framework of Compositional Logic Koji Hasebe Mitsuhiro Okada (Dept. of Philosophy, Keio University)
Deeper Security Analysis of Web-based Identity Federation Apurva Kumar IBM Research – India.
BAN Logic A Logic of Authentication Presentation by Heather Goldsby Michelle Pirtle (Mike Burrows, Marin Abadi, Roger Needham) Published 1989, SRC Research.
Background information Formal verification methods based on theorem proving techniques and model­checking –to prove the absence of errors (in the formal.
CPSC 322, Lecture 23Slide 1 Logic: TD as search, Datalog (variables) Computer Science cpsc322, Lecture 23 (Textbook Chpt 5.2 & some basic concepts from.
Case Study: Using PVS to Analyze Security Protocols Kyle Taylor.
Formally (?) Deriving Security Protocols Anupam Datta WIP with Ante Derek, John Mitchell, Dusko Pavlovic October 23, 2002.
CPSC 322, Lecture 23Slide 1 Logic: TD as search, Datalog (variables) Computer Science cpsc322, Lecture 23 (Textbook Chpt 5.2 & some basic concepts from.
Abstraction and Refinement in Protocol Derivation Anupam DattaAnte Derek John C. Mitchell Dusko Pavlovic Stanford University Kestrel Institute CSFW June.
1 Trust Management and Theory Revision Ji Ma School of Computer and Information Science University of South Australia 24th September 2004, presented at.
Modelling and Analysing of Security Protocol: Lecture 1 Introductions to Modelling Protocols Tom Chothia CWI.
A Logic of Authentication Michael Burrows, Martin Abadi, Roger Needham BAN Logic Presented by : Wenjin Hu.
C SC 520 Principles of Programming Languages 1 C SC 520: Principles of Programming Languages Peter J. Downey Department of Computer Science Spring 2006.
Chapter 2 Protocols Controlling communications of principals in systems.
Protocol Composition Logic Arnab Roy joint work with A. Datta, A. Derek, N. Durgin, J.C. Mitchell, D. Pavlovic CS259: Security Analysis of Network Protocols,
Information Security of Embedded Systems : BAN-Logic Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Inductive Verification of Protocols Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Framework for K-12 Science Education
Formal Methods 1. Software Engineering and Formal Methods  Every software engineering methodology is based on a recommended development process  proceeding.
PROGRAMMING LANGUAGES The Study of Programming Languages.
CIS 5371 Cryptography Introduction.
1 CIS 5371 Cryptography 3. Private-Key Encryption and Pseudorandomness B ased on: Jonathan Katz and Yehuda Lindel Introduction to Modern Cryptography.
Chapter 6: Foundations of Business Intelligence - Databases and Information Management Dr. Andrew P. Ciganek, Ph.D.
Mathematical Modeling and Formal Specification Languages CIS 376 Bruce R. Maxim UM-Dearborn.
Empirical Explorations with The Logical Theory Machine: A Case Study in Heuristics by Allen Newell, J. C. Shaw, & H. A. Simon by Allen Newell, J. C. Shaw,
Assessing the Suitability of UML for Modeling Software Architectures Nenad Medvidovic Computer Science Department University of Southern California Los.
Copyright 2002 Prentice-Hall, Inc. Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 20 Object-Oriented.
Formal Analysis of Security Protocols Dr. Changyu Dong
BAN LOGIC Amit Chetal Monica Desai November 14, 2001
Formal Models in AGI Research Pei Wang Temple University Philadelphia, USA.
A Logic of Belief and a Model Checking Algorithm for Security Protocols joint work with Massimo Benerecetti Fausto Giunchiglia University of Trento
Pattern-directed inference systems
1 Knowledge Representation. 2 Definitions Knowledge Base Knowledge Base A set of representations of facts about the world. A set of representations of.
A Locally Nameless Theory of Objects 1.Introduction:  -calculus and De Bruijn notation 2.locally nameless technique 3.formalization in Isabelle and proofs.
Formal Verification Lecture 9. Formal Verification Formal verification relies on Descriptions of the properties or requirements Descriptions of systems.
A Discussion on “Security Protocols over open networks and distributed Systems: Formal methods for their Analysis, Design, and Verification” S. Gritzalis,
Confidentiality-preserving Proof Theories for Distributed Proof Systems Kazuhiro Minami National Institute of Informatics FAIS 2011.
Requirements Engineering Methods for Requirements Engineering Lecture-30.
Formal Specification of Intrusion Signatures and Detection Rules By Jean-Philippe Pouzol and Mireille Ducassé 15 th IEEE Computer Security Foundations.
Correctness Proofs and Counter-model Generation with Authentication-Protocol Logic Koji Hasebe Mitsuhiro Okada Department of Philosophy, Keio University.
Using Meta-Model-Driven Views to Address Scalability in i* Models Jane You Department of Computer Science University of Toronto.
ARTIFICIAL INTELLIGENCE [INTELLIGENT AGENTS PARADIGM] Professor Janis Grundspenkis Riga Technical University Faculty of Computer Science and Information.
3.2 Semantics. 2 Semantics Attribute Grammars The Meanings of Programs: Semantics Sebesta Chapter 3.
CSE Winter 2008 Introduction to Program Verification January 31 proofs through simplification.
9/30/98 Prof. Richard Fikes Inference In First Order Logic Computer Science Department Stanford University CS222 Fall 1998.
Non-interference in Constructive Authorization Logic Deepak Garg and Frank Pfenning Carnegie Mellon University.
CS6133 Software Specification and Verification
Network Protocols Network Systems Security Mort Anvari.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Artificial Intelligence “Introduction to Formal Logic” Jennifer J. Burg Department of Mathematics and Computer Science.
Of 38 lecture 13: propositional logic – part II. of 38 propositional logic Gentzen system PROP_G design to be simple syntax and vocabulary the same as.
Formal Specification: a Roadmap Axel van Lamsweerde published on ICSE (International Conference on Software Engineering) Jing Ai 10/28/2003.
Formal Verification. Background Information Formal verification methods based on theorem proving techniques and model­checking –To prove the absence of.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Some Thoughts to Consider 5 Take a look at some of the sophisticated toys being offered in stores, in catalogs, or in Sunday newspaper ads. Which ones.
IS 2620: Developing Secure Systems Formal Verification/Methods Lecture 9 March 15, 2012.
COMP 412, FALL Type Systems C OMP 412 Rice University Houston, Texas Fall 2000 Copyright 2000, Robert Cartwright, all rights reserved. Students.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
SysML v2 Formalism: Requirements & Benefits
Formal Verification/Methods
CSE 3302 Programming Languages
Analyzing Key Distribution and Authentication Protocols
Logical architecture refinement
IS 2935: Developing Secure Systems
Department of Computer Science Abdul Wali Khan University Mardan
CSCE 715: Network Systems Security
Protocol Verification by the Inductive Method
ONTOMERGE Ontology translations by merging ontologies Paper: Ontology Translation on the Semantic Web by Dejing Dou, Drew McDermott and Peishen Qi 2003.
Presentation transcript:

CSE Michigan State University Extensions of BAN by Heather Goldsby Michelle Pirtle

CSE Michigan State University Overview BAN Logic – Burrows, Abadi, and Needham GNY – Gong, Needham, Yahalom RV AT – Abadi and Tuttle VO – van Oorschot SVO – Syverson and van Oorschot Wenbo Mao – “Mao” Comparison Conclusion

CSE Michigan State University BAN Logic – 1989 Goal: Offer a formalization of the description and analysis of authentication protocols over distributed computer systems –State what is accomplished by the protocol –Allow reasoning about, and comparisons of, protocol assumptions –Draw attention to unnecessary actions that can be removed from a protocol –Highlight any encrypted messages that could be sent in clear text Tool: SPEAR –Model analyzer for BAN Logic and GNY –Developed for security protocols

CSE Michigan State University BAN (cont.) Advantages –Introduced a simple and powerful notation –Logic postulates (ie. Nonce-verification rule) are straight forward to apply for deriving BAN beliefs Disadvantages –Idealization step can cause analysis problems –No formal syntax or semantics –Does not account for improper encryption –A principal’s beliefs cannot be changed at later stages of the protocol –Logic limited to analyze authentication protocols –Honesty and trust in other principals is not addressed

Foundation of Each Logic BANGNYGSATVOSVOMaoRV BAN GNYX GSX ATX VOXXXX SVOXXXXX MaoXXXXXX RVX Read across - States which logic(s) were used to design the new logic Read down - States which logic(s) extended from the logic Logics listed in increasing year of publication

CSE Michigan State University GNY Goal: Gain ability to analyze more protocols in a more consistent manner Extends and reformulates BAN –Notions are expanded –New rules and constructs –Eliminate some of BAN’s universal assumptions Tools: –SPEAR Model analyzer for BAN Logic and GNY Developed for security protocols –Pattern scanner used as a parser for “not-originated-here” notion

CSE Michigan State University GNY (cont.) Advantages –Multiple levels of trust can be used in reasoning –More protocols can be analyzed –Making some BAN assumptions explicit allows for generality Disadvantages –R6 is unsound –Combining rules can result in unsound conclusions –The set of rules is incomplete –Some rules have redundant premises E.g. I2

CSE Michigan State University RV – 1996 Goal: Provide a logic of belief, based on BAN for use with a theory generator Extension of BAN –Explicit interpretation Idealization step –Fails to consider other interpretations –Hidden assumptions about safety of message –Responsibility Account for principal’s irresponsible behavior Tool: RVChecker –Theory Generator

CSE Michigan State University RV (cont.) Advantages –Maintains the original simplicity of BAN –Has tool support –Addresses principal responsibility and the idealization step Disadvantages –No formal syntax or semantics –Unable to specify full range of protocols

CSE Michigan State University AT – 1991 Goal: Find a natural semantic model for BAN Extensions: –Provides formal syntax and semantics –Simplifies existing BAN inference rules –Reformulates inference rules as axioms –Removes need for honesty

CSE Michigan State University AT (cont.) Advantages –Formal syntax and semantics –Addresses question of principal honesty –More elegant proof system owing to rules of BAN being rewritten as axioms Disadvantages –No tool support –Assumes perfect encryption –Does not address idealization step

CSE Michigan State University VO – 1993 Goal: Extend BAN family of logics in a manner that allows authenticated key agreement protocols to be analyzed, and to better examine goals and beliefs in the protocols. Extensions –Refine the BAN construct “shares the good crypto key” –Define new key confirmation primitive –Define new postulates for use with reasoning about “jointly established” keys

CSE Michigan State University VO (cont.) Advantages –Accomplishes analysis of a new set of protocols –Allows for a closer analysis of the goals and beliefs of the new set of protocols Disadvantages –Time is ignored –Message ordering is not addressed

CSE Michigan State University SVO – 1994 Goal: Unification of BAN, GNY, AT, & VO Extensions: –Include public keys –New functions –Message comprehensibility

CSE Michigan State University SVO (cont.) Advantages –Proved to be sound Disadvantages –Not suited for tool support SVD revamped SVO: developed to be compatible with Isabelle theorem prover

CSE Michigan State University Mao – 1995 Goal: Formalize the idealization step Extension: –Rule-based idealization technique –Remove need for perfect encryption assumption

CSE Michigan State University Mao (cont.) Advantages –Formalization of idealization technique –Eliminates assumption of perfect cryptography Disadvantages –No tool support –No proof of soundness for idealization rules

CSE Michigan State University Comparison Table Part 1

CSE Michigan State University Comparison Table Part 2

CSE Michigan State University Conclusions BAN gave a very good foundation to expand upon BAN-like logics do not need to be limited to authentication protocols No one logic can or will cover all aspects of protocol analysis More tool support is needed

CSE Michigan State University Possible Future Work Possible extensions to our work: –Include other BAN-like logics Gaarder Snekkenes - GS Sigrid Gurgens – SG Mao and Boyd SVD – An extension of SVO –Design and develop tool support

CSE Michigan State University References Kindred, "Theory Generation for Security Protocols“ archive.adm.cs.cmu.edu/anon/1999/CMU-CS pdf Mao, "An Augmentation of BAN-Like Logics“ Syverson and van Oorschot, "On unifying some cryptographic protocol logics“ M. Abadi and M. Tuttle, "A Semantics for a Logic of Authentication“. Burrows, Abadi & Needham, “A Logic of Authentication” Gong, Needham and Yahalom, "Reasoning About Belief in Cryptographic Protocols” van Oorschot,”Extending cryptographic logics of belief to key agreement protocols”

CSE Michigan State University Relationships Among Logics BAN GS AT GNY VO SVO Mao RV SG ?