Formal methods analysis of the secure remote password protocol

AT Sherman, E Lanus, M Liskov, E Zieglar… - Logic, Language, and …, 2020 - Springer
Abstract We analyze the Secure Remote Password (SRP) protocol for structural weaknesses
using the Cryptographic Protocol Shapes Analyzer (CPSA) in the first formal analysis of SRP …

A hybrid analysis for security protocols with state

JD Ramsdell, DJ Dougherty, JD Guttman… - … Conference on Integrated …, 2014 - Springer
Cryptographic protocols rely on message-passing to coordinate activity among principals.
Many richly developed tools, based on well-understood foundations, are available for the …

Cryptographic Binding Should Not Be Optional: A Formal-Methods Analysis of FIDO UAF Authentication

E Golaszewski, AT Sherman, E Zieglar - ACM CCS (submitted), 2023 - par.nsf.gov
sa case study in cryptographic binding, we present a formal-methods analysis of the Fast
IDentity Online (FIDO) Universal Authentication Framework (UAF) authentication protocol's …

Understanding attestation: Analyzing protocols that use quotes

JD Guttman, JD Ramsdell - … City, Luxembourg, September 26–27, 2019 …, 2019 - Springer
Attestation protocols use digital signatures and other cryptographic values to convey
evidence of hardware state, program code, and associated keys. They require hardware …

[PDF][PDF] The CPSA Specification: A Reduction System for Searching for Shapes in Cryptographic Protocols

JD Ramsdell, JD Guttman, MD Liskov… - The MITRE …, 2009 - hackage.haskell.org
We describe a term reduction system that enumerates all essentially different executions
possible for a cryptographic protocol. We call them the shapes of the protocol. Naturally …

Enrich-by-need protocol analysis for Diffie-Hellman

MD Liskov, JD Guttman, JD Ramsdell, PD Rowe… - Foundations of Security …, 2019 - Springer
Enrich-by-need analysis characterizes all executions of a security protocol that extend a
given scenario. It computes a strongest security goal the protocol achieves in that scenario …

[HTML][HTML] Cryptographic protocol analysis and compilation using CPSA and Roletran

JD Ramsdell - Protocols, Strands, and Logic: Essays Dedicated to …, 2021 - Springer
Abstract The Cryptographic Protocol Shapes Analyzer cpsa determines if a cryptographic
protocol achieves authentication and secrecy goals. It can be difficult to ensure that an …

Automatically Binding Cryptographic Context to Messages in Network Using Formal Methods

E Golaszewski - 2024 - search.proquest.com
Using formal methods, we identify and correct the failure of cryptographic network protocols
to establish explicit session contexts and cryptographically bind their messages to these …

Security protocol analysis in context: computing minimal executions using SMT and CPSA

DJ Dougherty, JD Guttman, JD Ramsdell - Integrated Formal Methods …, 2018 - Springer
Cryptographic protocols are used in different environments, but existing methods for protocol
analysis focus only on the protocols, without being sensitive to assumptions about their …

Analysis of a forced-latency defense against man-in-the-middle attacks

EF Lanus, EV Zieglar - Journal of Information Warfare, 2017 - JSTOR
Several cryptographic protocols have been proposed to address the Man-in-the-Middle
(MitM) attack without the prior exchange of keys. In this paper, one such protocol proposed …