DefinePK hosts the largest index of Pakistani journals, research articles, news headlines, and videos. It also offers chapter-level book search.
Title: Enhancing Computer Security through Formal Verification of Cryptographic Protocols Using Model Checking and Partial Order Techniques
Authors: Mahlaqa Saeed, Muhammad Ibrar, Dua Mahmood, Amirmohammad Delshadi, Aqdas saleemi
Journal: The Asian Bulletin of Big Data Management (ABBDM)
Publisher: ASIAN ACADEMY OF BUSINESS AND SOCIAL SCIENCE RESEARCH
Country: Pakistan
Year: 2024
Volume: 4
Issue: 2
Language: English
This study explores the integration of partial, order reduction techniques with model checking to enhance the verification of cryptographic protocols. Cryptographic, protocols are essential for securing digital communications, and data; however, ensuring their robustness and reliability through traditional verification methods can be challenging due to, their complexity and the vast number of potential executions, paths. This research utilizes the SPIN, model checker and PROMELA language to model and verify three types of, cryptographic protocols: a basic authentication handshake, an encrypted data transfer, protocol, and a complex, multi-factor authentication process. Each protocol was, verified with and, without the application of partial order reduction techniques. The findings demonstrate that partial order, reduction, not only significantly reduces the computational resources, required—by approximately 40%—but also maintains the thoroughness needed to identify critical, security flaws such as replay, attacks, data integrity breaches, and authentication failures. This study, underscores the, efficacy of combining partial order reduction with model, checking, proposing that this, approach significantly improves the scalability and efficiency, of cryptographic protocol, verification. The results advocate, for the continued development and application of these, techniques to ensure the secure and reliable deployment of cryptographic protocols in various digital environments
To explore the integration of partial order reduction techniques with model checking to enhance the verification of cryptographic protocols, aiming to improve scalability and efficiency while maintaining thoroughness in identifying security flaws.
The study employed the SPIN model checker and PROMELA language to model and verify three types of cryptographic protocols: a basic authentication handshake, an encrypted data transfer protocol, and a complex multi-factor authentication process. Each protocol was verified with and without the application of partial order reduction techniques.
graph TD
A["Select Cryptographic Protocols"] --> B["Model Protocols in PROMELA"];
B --> C["Verify without Partial Order Reduction"];
B --> D["Apply Partial Order Reduction"];
C --> E["Analyze Results"];
D --> F["Verify with Partial Order Reduction"];
F --> E;
E --> G["Identify Vulnerabilities"];
G --> H["Propose Corrections"];
H --> I["Conclusion"];
The integration of partial order reduction with model checking demonstrates improved scalability and efficiency for verifying complex cryptographic protocols. This formal verification approach uncovers vulnerabilities that traditional methods might miss, offering a more systematic and rigorous analysis.
Partial order reduction, when combined with model checking, significantly reduces computational resources by approximately 40% while maintaining the thoroughness required to identify critical security flaws such as replay attacks, data integrity breaches, and authentication failures.
Integrating partial order reduction with model checking provides a powerful and efficient tool for enhancing the security of cryptographic protocols, leading to more reliable and robust digital communications.
- Partial order reduction reduced computational resources by approximately 40%.
- Three types of cryptographic protocols were modeled and verified: basic authentication handshake, encrypted data transfer, and complex multi-factor authentication.
- The SPIN model checker and PROMELA language were utilized for the verification process.
Loading PDF...
Loading Statistics...