信息安全研究 ›› 2016, Vol. 2 ›› Issue (3): 272-279.

• 技术应用 • 上一篇    下一篇

形式化工具Scyther优化与实例分析

韩旭   

  1. 洛阳外国语学院
  • 收稿日期:2016-03-15 出版日期:2016-03-15 发布日期:2016-03-16
  • 通讯作者: 韩旭
  • 作者简介:硕士研究生,主要研究方向为密码学和信息安全.

The Improvement and Instance Analysis of the Formal Verification Tool Scyther

Xu Han   

  • Received:2016-03-15 Online:2016-03-15 Published:2016-03-16
  • Contact: Xu Han

摘要: 当前安全协议形式化分析工具发展迅速,针对不同的安全协议、不同的安全模型挑选合适的工具进行分析,不仅可以提高分析结果的可信度和准确性,还可以大大提高协议分析的效率. 为此,对当前主流的9种形式化分析工具的性能进行梳理,从使用界面、分析效率、安全模型等综合角度来看,Scyther工具有着较大的优势;为方便国内协议分析者使用和研究,剖析Scyther的底层算法,将其交互界面进行汉化,并增添了时间计算功能,对分析时间进行计算和输出;最后以网络安全协议TLS为例,利用优化后的Scyther工具分别在DelovYao模型和强安全模型下对其进行形式化分析. 对研究工作者准确、有效地选择和使用形式化分析工具有着理论意义和实践价值.

关键词: 形式化分析工具, Scyther工具, 比较研究, 安全模型, TLS协议

Abstract: As formal verification tools for security protocols develop rapidly, picking a suitable tool, according to the target protocols and the security models, can improve not only the reliability and accuracy of protocol analysis, but also the efficiency of it. With these considerations, we compare the properties of 9 kinds of the formal verification tools in detail and we find that the Scyther tool can be an optimal choice in terms of interface interactivity, analysis efficiency and security model validity. In an attempt to facilitate using and researching of the tool for analysts in China, we study and analyze the underlying algorithm of Scyther and translate the interface into Chinese; we also update Scyther by adding a timer that can count and output the analysis time. Finally, we use the updated Scyther to make a formal analysis of the network security protocol TLS within the DelovYao model and strong security model. The current study is of theoretical and practical value for it helping researchers to select and use formal analysis tools more accurately and effectively.

Key words: formal verification tools, Scyther tool, comparison study, security model, TLS protocol