Computer Science ›› 2021, Vol. 48 ›› Issue (6A): 477-480.doi: 10.11896/jsjkx.200500072

• Information Security • Previous Articles     Next Articles

Formal Verification of Otway-Rees Protocol Based on Process Algebra

CAI Yu-tong1, WANG Yong1, WANG Ran-ran1, JIANG Zheng-tao2, DAI Gui-ping3   

  1. 1 College of Computer Science and Technology,Faculty of Information Technology,Beijing University of Technology,Beijing 100124,China
    2 School of Computer Science and Cybersecurity,Communication University of China,Beijing 100024,China
    3 College of Artificial Intelligence and Automation,Faculty of Information Technology,Beijing University of Technology,Beijing 100124,China
  • Online:2021-06-10 Published:2021-06-17
  • About author:CAI Yu-tong,born in 1996,postgraduate.Her main research interests include big data and deep learning.
  • Supported by:
    Guangxi Key Laboratory of Cryptography and Information Security Research Project(GCIS201808).

Abstract: Otway-Rees protocol is to complete the two-way authentication between the initiator and the responder,and to distri-bute the session key generated by the server.The feature of this protocol is simple and practical.It does not use complicated synchronous clock mechanism or double encryption,and provides good timeliness with only a small amount of information.This protocol allows individual communications to be authenticated through a network,while also preventing replay attacks and eavesdropping,as well as modifying detection.The analysis of security protocols is a key issue that cannot be avoided in the information age.Formal method,which is based on strict mathematical and mechanical methods,is an important method to improve and ensure the quality of computing system.Its model,technology and tools have become an important carrier of computing thinking.The formal method can accurately reveal all kinds of logic rules,make corresponding logic rules,and make all kinds of theoretical systems more rigorous.Formal method is a mathematical description of what a program does,a description of the function of a program written in a formal language with precise semantics.It is not only the starting point of designing and programming,but also the basis of verifying whether a program is correct,so as to improve the reliability and robustness of the design.By abstracting the Otway-Rees protocol,we can get the abstract model.On this basis,the formal description based on process algebra is gi-ven and the formal verification is carried out.The verification results show that the parallel system in the form of this protocol shows the expected external behavior.

Key words: Formalization, Otway-Rees, Process algebra, Protocol verification, Security protoco

CLC Number: 

  • TP301.2
[1] ZAJAC B P.Applied cryptography:Protocols, algorithms, and source code in C[J].Computers & Security,1994,13(3):217-218.
[2] OROS H,BOIAN F.Spi calculus analysis of Otway-Rees protocol[J].International Journal of Computers,Communications & Control (IJCCC),2008,3(3):427-432.
[3] Fokkink.Introduction to Process Algebra[J].Texts in Theoretical Computer Science An Eatcs,2000:1-163.
[4] VAGLINI G.Communication and concurrency:R Milner Prentice Hall (1989) 260pp 17.95 softback[J]. Information and Software Technology,1991,33(6):462.
[5] HOARE T,O'HEARN P.Separation Logic Semantics for Communicating Processes[J].Electronic Notes in Theoretical Computer Science,2008,212:3-25.
[6] BERGSTRA J A,KLOP J W.Algebra of communicating processes with abstraction[J].Theoretical Computer Science,1985,37(85):77-121.
[7] 王勇,许荣强,任兴田,等.可信计算中信任链建立的形式化验证[J].北京工业大学学报,2016,42(3):73-78.
[8] 王勇,方娟,任兴田,等.基于进程代数的TCG远程证明协议的形式化验证[J].计算机研究与发展,2013(2):103-109.
[1] JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang. Authentication and Key Agreement Protocol for UAV Communication [J]. Computer Science, 2022, 49(8): 306-313.
[2] NI Liang, WANG Nian-ping, GU Wei-li, ZHANG Qian, LIU Ji-zhao, SHAN Fang-fang. Research on Lattice-based Quantum-resistant Authenticated Key Agreement Protocols:A Survey [J]. Computer Science, 2020, 47(9): 293-303.
[3] DONG Qi-ying, SHAN Xuan, JIA Chun-fu. Impact of Zipf's Law on Password-related Security Protocols [J]. Computer Science, 2020, 47(11): 42-47.
[4] SONG Lan, XUE Jin-yun, HU Qi-min, XIE Wu-ping, JIANG Dong-ming and YOU Zhen. Research of Automatic Verification Method about Radio Frequency Identification Protocol [J]. Computer Science, 2017, 44(9): 99-104.
[5] LIN Lei-lei, ZHOU Hua, DAI Fei, HE Zhen-li, SHEN Yong and KANG Hong-wei. Method of Software Architecture Refinement Based on Algebraic Semantics [J]. Computer Science, 2017, 44(7): 141-146.
[6] LIAO Yong, FAN Zhuo-chen and ZHAO Ming. Survey on Security Protocol of Space Information Networks [J]. Computer Science, 2017, 44(4): 202-206.
[7] ZHENG Ming, LI Tong, LIN Ying, ZHOU Xiao-xuan, LI Xiang and MING Li. Dynamic Evolution Consistency Verification Method for Component System Modeling [J]. Computer Science, 2017, 44(11): 80-86.
[8] LI Xiang, LI Tong, XIE Zhong-wen, HE Yun, CHENG Lei and HAN Xu. Multi-layer Model for SaaS Multi-tenancy [J]. Computer Science, 2017, 44(11): 56-63.
[9] LI Zong-hua, ZHOU Xiao-feng, WU Ke-li and CHEN Fu-bing. BPMN Formalization Based on Extended Petri Nets Model [J]. Computer Science, 2016, 43(11): 40-48.
[10] FENG Wei-ning, ZHANG Zhi-yong and ZHAO Chang-wei. Delegation Authorization Protocol Based on Remote Attestation Applied in Multimedia DRM [J]. Computer Science, 2015, 42(4): 132-135.
[11] SONG Wei-tao and HU Bin. One Strong Authentication Test Suitable for Analysis of Nested Encryption Protocols [J]. Computer Science, 2015, 42(1): 149-154.
[12] LI Ling,DU Xue-hui and BAO Yi-bao. Research on Optimization Technology of Reconfigurable Security Protocols Based on Reconfigurable Component [J]. Computer Science, 2014, 41(Z11): 245-249.
[13] LIU Jing,YE Xin-ming and MA Yuan-fei. Verification and Analysis of SIP Protocol Based on Timed Colored Petri Nets [J]. Computer Science, 2014, 41(7): 122-129.
[14] ZHANG Wei. Axiomatizing Weak Covariant-contravariant Simulation Semantics [J]. Computer Science, 2014, 41(11): 99-102.
[15] ZHU Rui,LI Tong,MO Qi,ZHANG Xuan,WANG Yi-quan,LIN Lei-lei and DAI Fei. Research on Deviation Diagnostic of Software Process Behavior Based on EPMM Modelling [J]. Computer Science, 2014, 41(11): 56-62.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!