A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties
[chapter]
2009
Lecture Notes in Computer Science
In this tutorial, we give an overview of the Maude-NRL Protocol Analyzer (Maude-NPA), a tool for the analysis of cryptographic protocols using functions that obey dierent equational theories. ...
Maude-NPA is a model-checker for cryptographic protocol analysis that both allows for the incorporation of dierent equational theories and operates in the unbounded session model without the use of abstraction ...
Introduction The Maude-NPA is a tool and inference system for reasoning about the security of cryptographic protocols in which the cryptosystems satisfy dierent equational properties. ...
doi:10.1007/978-3-642-03829-7_1
fatcat:l4ptn4q3erhrrdnpctq6eofxy4
Sequential Protocol Composition in Maude-NPA
[chapter]
2010
Lecture Notes in Computer Science
Moreover, we show that, by a simple protocol transformation, we are able to analyze and verify this dynamic composition in the current Maude-NPA tool. ...
In this paper we discuss an extension to the Maude-NPA syntax and operational semantics to support dynamic sequential composition of protocols, so that protocols can be specified separately and composed ...
of rewrite rules obtained from the protocol strands that are used for backwards narrowing reachability analysis modulo the equational properties E P is R P = {(1), (2), (3)} ∪ (4). ...
doi:10.1007/978-3-642-15497-3_19
fatcat:4nhhxtrsqrdnlgo7gtdk4ljfgi
A rewriting-based forwards semantics for Maude-NPA
2014
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security - HotSoS '14
The Maude-NRL Protocol Analyzer (Maude-NPA) is a tool for reasoning about the security of cryptographic protocols in which the cryptosystems satisfy different equational properties. ...
This case corresponds to standard rewriting modulo an equational theory. ...
Maude-NPA is a symbolic cryptographic protocol analysis tool designed to reason about the security of protocols in which the cryptographic algorithms can be described using different equational theories ...
doi:10.1145/2600176.2600186
dblp:conf/hotsos/EscobarMMS14
fatcat:twpkbjqwrvc3tbpgichv2iirra
Effective Sequential Protocol Composition in Maude-NPA
[article]
2016
arXiv
pre-print
We also provide an experimental analysis of the performance of Maude-NPA using the compositional syntax and semantics, and compare it to the performance of a syntax and semantics for composition developed ...
In this paper we discuss an extension to the Maude-NPA syntax and its operational semantics to support dynamic sequential composition of protocols, so that protocols can be specified separately and composed ...
In Maude-NPA we use equations to represent the properties of crypto systems. ...
arXiv:1603.00087v1
fatcat:jvc3ph62erbarbiyoqn4hdynzi
A Formal Definition of Protocol Indistinguishability and Its Verification Using Maude-NPA
[chapter]
2014
Lecture Notes in Computer Science
interest to cryptographic protocol analysis. ...
This provides for the first time a framework for automatic analysis of indistinguishability modulo as wide a class of algebraic properties as FV, which includes many associative-commutative theories of ...
The backwards reachability analysis performed by Maude-NPA consists in symbolically running the protocol "in reverse" by narrowing modulo the equations E P . ...
doi:10.1007/978-3-319-11851-2_11
fatcat:24cqb3oclndl3hjw52wy5tqvvy
Formal verification of the YubiKey and YubiHSM APIs in Maude-NPA
[article]
2018
arXiv
pre-print
Both are analyzed using the Maude-NPA cryptographic protocol analyzer. ...
for storing previously seen keys or nonces, (iii) event-based properties that require an analysis of sequences of actions, and (iv) reasoning modulo exclusive-or. ...
In Maude-NPA, as in most formal analysis tools for cryptographic protocols, a protocol is a set of rules that describe the actions of honest principals communication across a network controlled by an intruder ...
arXiv:1806.07209v1
fatcat:c5f6eodqpfcezcivwc2f5clbhq
Analysis of the IBM CCA Security API Protocols in Maude-NPA
[chapter]
2014
Lecture Notes in Computer Science
In this paper we analyze the IBM 4758 Common Cryptographic Architecture (CCA) protocol using an advanced automated protocol verification tool with full exclusive-or capabilities, the Maude-NPA tool. ...
Thus a number of general-purpose cryptographic protocol analysis tools have been developed and applied to protocol standards. ...
One is the Maude-NPA protocol analysis tool [12] , which supports equational theories having finite variant decompositions, which includes exclusive-or. ...
doi:10.1007/978-3-319-14054-4_8
fatcat:rxwlexqrnbah7in7hurzkgxgmq
Protocol Analysis Modulo Combination of Theories: A Case Study in Maude-NPA
[chapter]
2011
Lecture Notes in Computer Science
O ur protocol analysi s m ethodol ogy i s then based on the i dea of backward reachabil ity anal ysis, where we begi n wi th one or m ore state patterns correspondi ng to attack states,and w ant to prove ...
Let ( ,A x,E ) be a decom position of an equational theory and t be a term . ...
doi:10.1007/978-3-642-22444-7_11
fatcat:w5b72ty5unewbpz7y6qmts6jne
Theories of Homomorphic Encryption, Unification, and the Finite Variant Property
2014
Proceedings of the 16th International Symposium on Principles and Practice of Declarative Programming - PPDP '14
We specify different versions of protocols using the different theories, and analyze them in the Maude-NPA cryptographic protocol analysis tool to assess their behavior. ...
Recent advances in the automated analysis of cryptographic protocols have aroused new interest in the practical application of unification modulo theories, especially theories that describe the algebraic ...
The protocol was specified and analyzed using the Maude-NPA cryptographic protocol analysis tool. ...
doi:10.1145/2643135.2643154
dblp:conf/ppdp/YangEMMN14
fatcat:ss5awwz6wffnnlp6i67rg5svcu
Equational Cryptographic Reasoning in the Maude-NRL Protocol Analyzer
2007
Electronical Notes in Theoretical Computer Science
The Maude-NRL Protocol Analyzer (Maude-NPA) is a tool and inference system for reasoning about the security of cryptographic protocols in which the cryptosystems satisfy different equational properties ...
We illustrate the ideas and capabilities of the Maude-NPA with an example involving the Diffie-Hellman key agreement protocol. ...
Introduction The Maude-NPA is a tool and inference system for reasoning about the security of cryptographic protocols in which the cryptosystems satisfy different equational properties. ...
doi:10.1016/j.entcs.2007.02.053
fatcat:76iv5kvvqzesjclji3zrrizqve
Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions
[chapter]
2012
Lecture Notes in Computer Science
, prove its soundness and completeness, and describe its implementation in the Maude-NPA protocol analysis tool. ...
We address a problem that arises in cryptographic protocol analysis when the equational properties of the cryptosystem are taken into account: in many situations it is necessary to guarantee that certain ...
Introduction There has been an increasing amount of research in recent years in building tools for cryptographic protocol analysis where the equational properties of the S. ...
doi:10.1007/978-3-642-33167-1_5
fatcat:ptueva5cwvfj3ccvbqbwntdqbu
State Space Reduction in the Maude-NRL Protocol Analyzer
[chapter]
2008
Lecture Notes in Computer Science
The Maude-NRL Protocol Analyzer (Maude-NPA) is a tool and inference system for reasoning about the security of cryptographic protocols in which the cryptosystems satisfy different equational properties ...
Maude-NPA supports a wide variety of algebraic properties that includes many crypto-systems of interest such as, for example, onetime pads and Diffie-Hellman. ...
Introduction The Maude-NPA is a tool and inference system for reasoning about the security of cryptographic protocols in which the cryptosystems satisfy different equational properties. ...
doi:10.1007/978-3-540-88313-5_35
fatcat:ngw3y4nbufawjl2wrjbvkq7bam
State space reduction in the Maude-NRL Protocol Analyzer
2014
Information and Computation
The Maude-NRL Protocol Analyzer (Maude-NPA) is a tool and inference system for reasoning about the security of cryptographic protocols in which the cryptosystems satisfy different equational properties ...
Maude-NPA supports a wide variety of algebraic properties that includes many crypto-systems of interest such as, for example, onetime pads and Diffie-Hellman. ...
Introduction The Maude-NPA is a tool and inference system for reasoning about the security of cryptographic protocols in which the cryptosystems satisfy different equational properties. ...
doi:10.1016/j.ic.2014.07.007
fatcat:v7r5isqei5akvnsfsv4pwvvydm
State Space Reduction in the Maude-NRL Protocol Analyzer
[article]
2011
arXiv
pre-print
The Maude-NRL Protocol Analyzer (Maude-NPA) is a tool and inference system for reasoning about the security of cryptographic protocols in which the cryptosystems satisfy different equational properties ...
Maude-NPA supports a wide variety of algebraic properties that includes many crypto-systems of interest such as, for example, one-time pads and Diffie-Hellman. ...
Introduction The Maude-NPA [4, 7] is a tool and inference system for reasoning about the security of cryptographic protocols in which the cryptosystems satisfy different equational properties. ...
arXiv:1105.5282v1
fatcat:lm6rasrkyzhpzgmras4q3eipqm
Strand Spaces with Choice via a Process Algebra Semantics
[article]
2019
arXiv
pre-print
In this paper we address the problem of representing choice in the strand space model of cryptographic protocols, particularly as it is used in the Maude-NPA cryptographic protocol analysis tool. ...
We have fully integrated the process algebra syntax and its transformation into strands in Maude-NPA. ...
What these results make possible is a sound and complete symbolic reachability analysis method for cryptographic protocols with choice modulo equational properties of the cryptographic functions satisfying ...
arXiv:1904.09946v1
fatcat:2tey4ev35jaavghtt2m42ivgi4
« Previous
Showing results 1 — 15 out of 85 results