Strand spaces: why is a security protocol correct?

作者: F.J.T. Fabrega , J.C. Herzog , J.D. Guttman

DOI: 10.1109/SECPRI.1998.674832

关键词:

摘要: A strand is a sequence of events; it represents either the execution an action by legitimate party in security protocol or else actions penetrator. space collection strands, equipped with graph structure generated causal interaction. In this framework, correctness claims may be expressed terms connections between strands different kinds. paper, we develop notion space. We then prove generally useful lemma, as sample result giving general bound on abilities penetrator any protocol. apply formalism to Needham-Schroeder-Lowe (G. Lowe, 1995, 1996). Our approach gives detailed view conditions under which achieves authentication and protects secrecy values exchanged. also use our proof methods explain why original Needham-Schroeder (1978) fails. believe that distinguished from other work verification simplicity model ease producing intelligible reliable proofs even without automated support.

参考文章(25)
Martín Abadi, Andrew D. Gordon, Reasoning about Cryptographic Protocols in the Spi Calculus international conference on concurrency theory. ,vol. 1243, pp. 59- 73 ,(1997) , 10.1007/3-540-63141-0_5
Tobias Nipkow, Lawrence C. Paulson, Isabelle: A Generic Theorem Prover ,(1994)
Joseph Y. Halpern, Reasoning about knowledge: a survey Handbook of logic in artificial intelligence and logic programming (Vol. 4). pp. 1- 34 ,(1995)
Dorothy E. Denning, Giovanni Maria Sacco, Timestamps in key distribution protocols Communications of The ACM. ,vol. 24, pp. 533- 536 ,(1981) , 10.1145/358722.358740
Michael Burrows, Martin Abadi, Roger Needham, A logic of authentication ACM Transactions on Computer Systems. ,vol. 8, pp. 18- 36 ,(1990) , 10.1145/77648.77649
D. Dolev, A. Yao, On the security of public key protocols IEEE Transactions on Information Theory. ,vol. 29, pp. 198- 208 ,(1983) , 10.1109/TIT.1983.1056650
J.H. Moore, Protocol failures in cryptosystems Proceedings of the IEEE. ,vol. 76, pp. 594- 602 ,(1988) , 10.1109/5.4444
Martín Abadi, Mark R. Tuttle, A semantics for a logic of authentication (extended abstract) Proceedings of the tenth annual ACM symposium on Principles of distributed computing - PODC '91. pp. 201- 216 ,(1991) , 10.1145/112600.112618
John Clark, Jeremy Jacob, On the security of recent protocols Information Processing Letters. ,vol. 56, pp. 151- 155 ,(1995) , 10.1016/0020-0190(95)00136-Z
A.W. Roscoe, Intensional specifications of security protocols Proceedings 9th IEEE Computer Security Foundations Workshop. pp. 28- 38 ,(1996) , 10.1109/CSFW.1996.503688