Improving automatic verification of security protocols with XOR

4Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Küsters and Truderung recently proposed an automatic verification method for security protocols with exclusive or (XOR). Their method reduces protocols with XOR to their XOR-free equivalents, enabling efficient verification by tools such as ProVerif. Although the proposed method works efficiently for verifying secrecy, verification of authentication properties is inefficient and sometimes impossible. In this paper, we improve the work by Küsters and Truderung in two ways. First, we extend their method for authentication verification to a richer class of XOR-protocols by automatically introducing bounded verification. Second, we improve the efficiency of their approach by developing a number of dedicated optimizations. We show the applicability of our work by implementing a prototype and applying it to both existing benchmarks and RFID protocols. The experiments show promising results and uncover a flaw in a recently proposed RFID protocol. © Springer-Verlag Berlin Heidelberg 2009.

Cite

CITATION STYLE

APA

Chen, X., Van Deursen, T., & Pang, J. (2009). Improving automatic verification of security protocols with XOR. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5885 LNCS, pp. 107–126). https://doi.org/10.1007/978-3-642-10373-5_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free