Suitability of a Classical Analysis Method for E-commerce Protocols

作者: Sigrid Gürgens , Javier Lopez

DOI: 10.1007/3-540-45439-X_4

关键词:

摘要: We present the adaptation of our model for validation key distribution and authentication protocols to address specific needs electronic commerce. The two models defer in both threat scenario formalization. demonstrate suitability by analyzing a version Internet Billing Server protocol introduced Carnegie Mellon University. Our analysis shows that, while security properties or shall provide are well understood, it is often not clear what an commerce can provide. methods rely on automatic theorem proving tools. Specifically, we used "Otter", software developed at Argonne National Laboratories.

参考文章(33)
Catherine A. Meadows, A System for the Specification and Verification of Key Management Protocols. ieee symposium on security and privacy. pp. 182- 197 ,(1991)
Ewing Lusk, Larry Wos, Jim Boyle, Ross Overbeek, Automated reasoning (2nd ed.): introduction and applications McGraw-Hill, Inc.. ,(1992)
Catherine A. Meadows, Catherine A. Meadows, Formal Verification of Cryptographic Protocols: A Survey international cryptology conference. pp. 135- 150 ,(1994) , 10.1007/BFB0000430
Makoto Tatebayashi, Natsume Matsuzaki, David B. Newman, Key Distribution Protocol for Digital Mobile Communication Systems international cryptology conference. pp. 324- 334 ,(1989) , 10.1007/0-387-34805-0_30
Carsten Rudolph, A Formal Model for Systematic Design of Key Establishment Protocols australasian conference on information security and privacy. pp. 332- 343 ,(1998) , 10.1007/BFB0053745
Victor Shoup, Avi Rubin, Session key distribution using smart cards theory and application of cryptographic techniques. pp. 321- 331 ,(1996) , 10.1007/3-540-68339-9_28
G Lowe, B Roscoe, M Goldsmith, S Schneider, P Ryan, Modelling and analysis of security protocols Addison-Wesley. ,(2001)
Giampaolo Bella, Lawrence C. Paulson, Kerberos Version 4: Inductive Analysis of the Secrecy Goals european symposium on research in computer security. pp. 361- 375 ,(1998) , 10.1007/BFB0055875
Catherine A. Meadows, Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches european symposium on research in computer security. pp. 351- 364 ,(1996) , 10.1007/3-540-61770-1_46