Formal Design of Efficient Authentication and Key Agreement Protocols

作者: Gunnar Jacobson

DOI: 10.1007/978-0-387-35568-9_7

关键词:

摘要: We present a new method for the formal requirements specification and design of Authentication Key-Agreement protocols. The “SDL combined with inverse BAN logic”, SDL/iBAN is based on application logic Burrows, Abadi Needham integration Specification Description Language SDL. exemplary Kerberos demonstrates applicability reliability method. classify cryptosystems protocol runs provide generic approach, which an idealised layer independent from cryptosystem to be used. show, how concrete specifications protocols may derived propose our existing methods software development tools.

参考文章(18)
Catherine A. Meadows, Catherine A. Meadows, Formal Verification of Cryptographic Protocols: A Survey international cryptology conference. pp. 135- 150 ,(1994) , 10.1007/BFB0000430
Mihir Bellare, Phillip Rogaway, Entity authentication and key distribution international cryptology conference. pp. 232- 249 ,(1993) , 10.1007/3-540-48329-2_21
Catherine Meadows, Applying Formal Methods to the Analysis of a Key Management Protocol Journal of Computer Security. ,vol. 1, pp. 5- 35 ,(1992) , 10.3233/JCS-1992-1102
Peter J Denning, None, ACM president's letter: throwaway programs Communications of The ACM. ,vol. 24, pp. 57- 58 ,(1981) , 10.1145/358549.358554
S. Pohlig, M. Hellman, An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) IEEE Transactions on Information Theory. ,vol. 24, pp. 106- 110 ,(1978) , 10.1109/TIT.1978.1055817
R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM. ,vol. 26, pp. 96- 99 ,(1983) , 10.1145/357980.358017
Dorothy E. Denning, Giovanni Maria Sacco, Timestamps in key distribution protocols Communications of The ACM. ,vol. 24, pp. 533- 536 ,(1981) , 10.1145/358722.358740
R. Kemmerer, C. Meadows, J. Millen, Three systems for cryptographic protocol analysis Journal of Cryptology. ,vol. 7, pp. 79- 130 ,(1994) , 10.1007/BF00197942
M. Abadi, R. Needham, Prudent engineering practice for cryptographic protocols ieee symposium on security and privacy. ,vol. 22, pp. 6- 15 ,(1994) , 10.1109/32.481513