J4 ›› 2012, Vol. 39 ›› Issue (4): 120-125+183.doi: 10.3969/j.issn.1001-2400.2012.04.022

• Original Articles • Previous Articles     Next Articles

Automatic detection of security protocols with XOR

YANG Yuanyuan1,2;MA Wenping1;LIU Weibo1;YU You2;GU Jian2   

  1. (1. State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an  710071, China;
    2. The Third Research Inst. of Ministry of Public Security, Shanghai  200031, China)
  • Received:2011-04-29 Online:2012-08-20 Published:2012-10-08
  • Contact: YANG Yuanyuan E-mail:yangyy@mail.xidian.edu.cn

Abstract:

Since most of the current model checking tools can not detect security protocols with XOR, a new model checker named SAT# is proposed. By defining the concept of abstract XOR term and its reduction rules, the new model greatly reduces the number of XOR messages produced by the intruder, and resolves the state space explosion problem resulting from the introduction of XOR operations, on the basis of which by adding the rewrite rules of XOR based on the abstract XOR term, the new model endows the intruder with the XOR operations, and thus is able to automatically detect the security protocols with XOR. The detection results of the BULL protocol show not only the practicality of the abstract XOR term but also the reliability of the SAT#.

Key words: security protocols, formal analyses, model checking, algebraic properties

CLC Number: 

  • TP 393.08