Analysis of Object-Specific Authorization Protocol (OSAP) using coloured Petri nets


Autoria(s): Seifi, Younes; Suriadi, Suriadi; Foo, Ernest; Boyd, Colin
Contribuinte(s)

Pieprzyk, Josef

Data(s)

30/01/2012

Resumo

The use of Trusted Platform Module (TPM) is be- coming increasingly popular in many security sys- tems. To access objects protected by TPM (such as cryptographic keys), several cryptographic proto- cols, such as the Object Specific Authorization Pro- tocol (OSAP), can be used. Given the sensitivity and the importance of those objects protected by TPM, the security of this protocol is vital. Formal meth- ods allow a precise and complete analysis of crypto- graphic protocols such that their security properties can be asserted with high assurance. Unfortunately, formal verification of these protocols are limited, de- spite the abundance of formal tools that one can use. In this paper, we demonstrate the use of Coloured Petri Nets (CPN) - a type of formal technique, to formally model the OSAP. Using this model, we then verify the authentication property of this protocol us- ing the state space analysis technique. The results of analysis demonstrates that as reported by Chen and Ryan the authentication property of OSAP can be violated.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/56060/

Publicador

Australian Computer Society Inc.

Relação

http://eprints.qut.edu.au/56060/1/Seifi.pdf

http://crpit.com/Vol125.html

Seifi, Younes, Suriadi, Suriadi, Foo, Ernest , & Boyd, Colin (2012) Analysis of Object-Specific Authorization Protocol (OSAP) using coloured Petri nets. In Pieprzyk, Josef (Ed.) Information Security 2012 - Proceedings of the Tenth Australasian Information Security Conference (AISC 2012): Conferences in Research and Practice in Information Technology, Volume 125, Australian Computer Society Inc., RMIT University, Melbourne, Vic., pp. 47-58.

Direitos

Copyright 2012 please consult the authors

Fonte

School of Electrical Engineering & Computer Science; School of Information Systems; Information Security Institute; Science & Engineering Faculty

Palavras-Chave #Coloured Petri Nets #CPN #CPN/Tools #security analysis #TPM #OSAP #Trusted Computing
Tipo

Conference Paper