Formal requirements for key distribution protocols

作者: Paul Syverson , Catherine Meadows

DOI: 10.1007/BFB0053447

关键词: Information securityComputer scienceProtocol (science)Authentication protocolComputer securityRequirements managementSoftware engineeringCryptographic protocolProtocol analysisNeeds analysisKey distribution

摘要: We discuss generic formal requirements for reasoning about two party key distribution protocols, using a language developed specifying security protocols. Typically earlier work has considered analysis of already Our goal is to present sets various contexts which can be applied at the design stage as well existing use protocol tool we have determine whether or not specific met some specified. show how this process uncovered flaw in and helped us refine our requirements.

参考文章(12)
Ray Bird, Inder Gopal, Amir Herzberg, Phil Janson, Shay Kutten, Refik Molva, Moti Yung, Systematic Design of Two-Party Authentication Protocols international cryptology conference. pp. 44- 61 ,(1991) , 10.1007/3-540-46766-1_3
Catherine Meadows, Applying Formal Methods to the Analysis of a Key Management Protocol Journal of Computer Security. ,vol. 1, pp. 5- 35 ,(1992) , 10.3233/JCS-1992-1102
B. Clifford Neuman, Stuart G. Stubblebine, A note on the use of timestamps as nonces ACM SIGOPS Operating Systems Review. ,vol. 27, pp. 10- 14 ,(1993) , 10.1145/155848.155852
Whitfield Diffie, Paul C. Van Oorschot, Michael J. Wiener, Authentication and authenticated key exchanges Designs, Codes and Cryptography. ,vol. 2, pp. 107- 125 ,(1992) , 10.1007/BF00124891
Paul F. Syverson, Adding time to a logic of authentication computer and communications security. pp. 97- 101 ,(1993) , 10.1145/168588.168600
Paul Syverson, On key distribution protocols for repeated authentication ACM SIGOPS Operating Systems Review. ,vol. 27, pp. 24- 30 ,(1993) , 10.1145/163640.163642
A. Kehne, J. Schönwälder, H. Langendörfer, A nonce-based protocol for multiple authentications ACM SIGOPS Operating Systems Review. ,vol. 26, pp. 84- 89 ,(1992) , 10.1145/142854.142872
D. Dolev, A. Yao, On the security of public key protocols IEEE Transactions on Information Theory. ,vol. 29, pp. 198- 208 ,(1983) , 10.1109/TIT.1983.1056650
R. Kemmerer, C. Meadows, J. Millen, Three systems for cryptographic protocol analysis Journal of Cryptology. ,vol. 7, pp. 79- 130 ,(1994) , 10.1007/BF00197942
P. Syverson, C. Meadows, A logical language for specifying cryptographic protocol requirements ieee symposium on security and privacy. pp. 165- 177 ,(1993) , 10.1109/RISP.1993.287634