The Applied Pi Calculus: Mobile Values, New Names, and Secure
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Formal Verification for Real-World Cryptographic Protocols and Implementations Nadim Kobeissi
Formal verification for real-world cryptographic protocols and implementations Nadim Kobeissi To cite this version: Nadim Kobeissi. Formal verification for real-world cryptographic protocols and implementations. Cryptography and Security [cs.CR]. Université Paris sciences et lettres, 2018. English. NNT : 2018PSLEE065. tel-03245433v4 HAL Id: tel-03245433 https://tel.archives-ouvertes.fr/tel-03245433v4 Submitted on 1 Jun 2021 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Préparée à Inria Paris Dans le cadre d'une cotutelle avec École Normale Supérieure — PSL Vérification formelle des protocoles et des implementations cryptographiques Formal Verification for Real-World Cryptographic Protocols and Implementations Soutenue par Composition du jury : Nadim Kobeissi David Pointcheval Le 10 décembre 2018 Directeur de recherche, ENS Paris Président Stéphanie Delaune Directeur de recherche, IRISA Rennes Rapporteur École doctorale no386 Tamara Rezk Directeur de recherche, Inria Sophia An- Rapporteur École Doctorale de Sci- tipolis ences Mathématiques de Cas -
Formal Verification of the Internet Key Exchange (Ikev2) Security Protocol Tristan Ninet
Formal verification of the Internet Key Exchange (IKEv2) security protocol Tristan Ninet To cite this version: Tristan Ninet. Formal verification of the Internet Key Exchange (IKEv2) security protocol. Cryptogra- phy and Security [cs.CR]. Université Rennes 1, 2020. English. NNT : 2020REN1S002. tel-02882167 HAL Id: tel-02882167 https://tel.archives-ouvertes.fr/tel-02882167 Submitted on 26 Jun 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Thèse de doctorat de L’UNIVERSITÉ DE RENNES 1 École Doctorale No 601 Mathématiques et Sciences et Technologies de l’Information et de la Communication Spécialité : Informatique Par Tristan NINET Formal verification of the Internet Key Exchange (IKEv2) security protocol Thèse présentée et soutenue à Rennes, le 9 mars 2020 Unité de recherche : Inria Rapporteurs avant soutenance : Caroline FONTAINE Directrice de Recherche, CNRS, LSV / ENS Paris-Saclay Steve KREMER Directeur de Recherche, Inria, LORIA Nancy Composition du Jury : Président : Steve KREMER Directeur de Recherche, Inria, LORIA Nancy Examinateurs : Pierre-Etienne MOREAU Professeur, Université de Lorraine, École des Mines de Nancy Thomas GENET Maître de conférence, Université de Rennes 1 Dir. de thèse : Stéphanie DELAUNE Directrice de Recherche, CNRS, IRISA Rennes Co-dir. -
Proverif 2.02Pl1: Automatic Cryptographic Protocol Verifier
ProVerif 2.02pl1: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial Bruno Blanchet, Ben Smyth, Vincent Cheval, and Marc Sylvestre [email protected], [email protected], [email protected], [email protected] September 2, 2020 ii Acknowledgements This manual was written with support from the Direction G´en´eralepour l'Armement (DGA) and the EPSRC project UbiVal (EP/D076625/2). ProVerif was developed while Bruno Blanchet was affiliated with INRIA Paris-Rocquencourt, with CNRS, Ecole Normale Sup´erieure,Paris, and with Max-Planck- Institut f¨urInformatik, Saarbr¨ucken. This manual was written while Bruno Blanchet was affiliated with INRIA Paris-Rocquencourt and with CNRS, Ecole Normale Sup´erieure,Paris, Ben Smyth was affiliated with Ecole Normale Sup´erieure,Paris and with University of Birmingham, Vincent Cheval was affiliated with CNRS and Inria Nancy, and Marc Sylvestre was affiliated with INRIA Paris. The development of ProVerif would not have been possible without the helpful remarks from the research community; their contributions are greatly appreciated and further feedback is encouraged. iii iv Contents 1 Introduction 1 1.1 Applications of ProVerif . .1 1.2 Scope of this manual . .2 1.3 Support . .2 1.4 Installation . .2 1.4.1 Installation via OPAM . .3 1.4.2 Installation from sources (Linux/Mac/cygwin) . .3 1.4.3 Installation from binaries (Windows) . .4 1.4.4 Emacs . .5 1.4.5 Atom . .5 1.5 Copyright . .5 2 Getting started 7 3 Using ProVerif 11 3.1 Modeling protocols . 11 3.1.1 Declarations . 11 3.1.2 Example: Declaring cryptographic primitives for the handshake protocol . -
Modeling and Verifying Security Protocols with the Applied Pi Calculus and Proverif
Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif Suggested Citation: Bruno Blanchet (2016), “Modeling and Verifying Security Pro- tocols with the Applied Pi Calculus and ProVerif”, : Vol. 1, No. 1, pp 1–135. DOI: 10.1561/3300000004. Bruno Blanchet INRIA Paris, France [email protected] This article may be used only for the purpose of research, teaching, and/or private study. Commercial use or systematic downloading (by robots or other automatic processes) is prohibited without ex- plicit Publisher approval. Boston — Delft Contents 1 Introduction2 1.1 Verifying security protocols................. 2 1.2 Structure of ProVerif.................... 10 1.3 Comparison with previous surveys.............. 11 2 The Protocol Specification Language 12 2.1 Core language: syntax and informal semantics....... 12 2.2 An example of protocol................... 20 2.3 Core language: type system................. 23 2.4 Core language: formal semantics.............. 24 2.5 Extensions.......................... 29 3 Verifying Security Properties 42 3.1 Adversary.......................... 42 3.2 Secrecy............................ 43 3.3 Correspondences....................... 64 3.4 Equivalences......................... 70 3.5 Usage heuristics....................... 81 4 Link with the Applied Pi Calculus 83 5 Applications 88 5.1 Case studies......................... 88 5.2 Extensions.......................... 89 5.3 ProVerif as back-end.................... 90 6 Conclusion 92 Acknowledgments 95 Appendices 96 A Proof of Theorem 3.5 97 B Proofs for Chapter4 100 B.1 Proof of Proposition 4.1................... 100 B.2 Proof of Propositions 4.2 and 4.3.............. 107 B.3 Relating definitions of observational equivalence...... 114 References 118 Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif Bruno Blanchet1 1INRIA Paris, France; [email protected] ABSTRACT ProVerif is an automatic symbolic protocol verifier.