notesum.ai
Published at November 20CryptoFormalEval: Integrating LLMs and Formal Verification for Automated Cryptographic Protocol Vulnerability Detection
cs.CR
cs.AI
cs.SC
Released Date: November 20, 2024
Authors: Cristian Curaba1, Denis D'Ambrosi1, Alessandro Minisini1, Natalia Pérez-Campanero Antolín2
Aff.: 1Institution 1; 2Institution 4
| Characters | Operators Involved | Vulnerability | |
|---|---|---|---|
| Protocol 1 | 161 | Symmetric encryption | Freshness of a nonce |
| Pre-shared key | |||
| Protocol 2 | 172 | Symmetric encryption | Secrecy of a nonce |
| Pre-shared key, xor777Currently, the automatic tool doesn’t implement the xor operator. | |||
| Protocol 3 | 227 | Symmetric encryption | Authenticity of |
| Asymmetric encryption | a nonce | ||
| Protocol 4 | 234 | Symmetric encryption | Aliveness |
| Exponentiation | of a party | ||
| Protocol 5 | 244 | Symmetric encryption | Aliveness |
| Hash function | of a party | ||
| Pre-shared key |