Analysis of two authorization protocols using Colored Petri Nets
Data(s) |
01/06/2015
|
---|---|
Resumo |
To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant authorization data before access to the objects can be granted. Chen and Ryan’s 2009 analysis has demonstrated OSAP’s authentication vulnerability in sessions with shared authorization data. They also proposed the Session Key Authorization Protocol (SKAP) with fewer stages as an alternative to OSAP. Chen and Ryan’s analysis of SKAP using ProVerif proves the authentication property. The purpose of this paper was to examine the usefulness of Colored Petri Nets (CPN) and CPN Tools for security analysis. Using OSAP and SKAP as case studies, we construct intruder and authentication property models in CPN. CPN Tools is used to verify the authentication property using a Dolev–Yao-based model. Verification of the authentication property in both models using the state space tool produces results consistent with those of Chen and Ryan. |
Identificador | |
Publicador |
Springer Berlin Heidelberg |
Relação |
DOI:10.1007/s10207-014-0243-z Seifi, Younes, Suriadi, Suriadi, Foo, Ernest, & Boyd, Colin (2015) Analysis of two authorization protocols using Colored Petri Nets. International Journal of Information Security, 14(3), pp. 221-247. |
Direitos |
Copyright 2014 Springer-Verlag Berlin Heidelberg |
Fonte |
School of Electrical Engineering & Computer Science; School of Information Systems; Science & Engineering Faculty |
Palavras-Chave | #Colored Petri Nets #CPN #CPN Tools #Security Analysis #TPM #SKAP #OSAP #Trusted computing #ASK-CTL |
Tipo |
Journal Article |