Breaking security protocols as an AI planning problem

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

Properties like confidentiality, authentication and integrity are of increasing importance to communication protocols. Hence the development of formal methods for the verification of security protocols. This paper proposes to represent the verification of security properties as a (deductive or model-based) logical AI planning problem. The key intuition is that security attacks can be seen as plans. Rather then achieving "positive" goals a planner must exploit the structure of a security protocol and coordinate the communications steps of the agents and the network (or a potential enemy) to reach a security violation. The planning problem is formalized with a variant of dynamic logic where actions are explicit computation (such as cryptanalyzing a message) and communications steps between agents. A theory of computational properties is then coupled with a description of the particular communication protocols and an example for a key-distribution protocol is shown.
Original languageEnglish
Title of host publicationRecent Advances in AI Planning - 4th European Conference on Planning, ECP 1997, Proceedings
PublisherSpringer Verlag
Pages286-298
DOIs
Publication statusPublished - 1997
Externally publishedYes
Event4th European Conference on Planning, ECP 1997 - , France
Duration: 24 Sept 199726 Sept 1997

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference4th European Conference on Planning, ECP 1997
Country/TerritoryFrance
Period24/09/9726/09/97

Fingerprint

Dive into the research topics of 'Breaking security protocols as an AI planning problem'. Together they form a unique fingerprint.

Cite this