The layered games framework for specifications and analysis of security protocols

被引:0
|
作者
Herzberg, Amir [1 ]
Yoffe, Igal [1 ]
机构
[1] Bar Ilan Univ, Dept Comp Sci, IL-52900 Ramat Gan, Israel
来源
THEORY OF CRYPTOGRAPHY | 2008年 / 4948卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The layered games framework provides a solid foundation to the accepted methodology of building complex distributed systems, as a 'stack' of independently-developed protocols. Each protocol in the stack, realizes a corresponding 'layer' model, over the 'lower layer'. We define layers, protocols and related concepts. We then prove the fundamental lemma of layering. The lemma shows that given a stack of protocols {pi(i)}(i=1)(u) s.t. for every i is an element of {1,...u}, protocol pi(i) realizes layer L-i over layer Li-1, then the entire stack can be composed to a single protocol pi(u parallel to...parallel to 1), which realizes layer L-u over layer L-0. The fundamental lemma of layering allows precise specification, design and analysis of each layer independently, and combining the results to ensure properties of the complete system. This is especially useful when considering (computationally-bounded) adversarial environments, as for security and cryptographic protocols. Our specifications are based on games, following many works in applied cryptography. This differs from existing frameworks allowing compositions of cryptographic protocols, which are based on simulatability of ideal functionality.
引用
收藏
页码:125 / 141
页数:17
相关论文
共 50 条
  • [1] Security protocols and specifications
    Abadi, M
    [J]. FOUNDATIONS OF SOFTWARE SCIENCE AND COMPUTATION STRUCTURES, 1999, 1578 : 1 - 13
  • [2] Intensional specifications of security protocols
    Roscoe, AW
    [J]. 9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 28 - 38
  • [3] Observational equivalence and security games: Enhancing the formal analysis of security protocols
    Cai, Liujia
    Cai, Guangying
    Lu, Siqi
    Li, Guangsong
    Wang, Yongjuan
    [J]. COMPUTERS & SECURITY, 2024, 140
  • [4] Verifying layered security protocols
    Gibson-Robinson, Thomas
    Kamil, Allaa
    Lowe, Gavin
    [J]. JOURNAL OF COMPUTER SECURITY, 2015, 23 (03) : 259 - 307
  • [5] Overview security analysis of 3G authentication protocols and technical specifications
    Cao, Chenlei
    Zhang, Ru
    Niu, Xinxin
    Zhou, Linna
    Zhang, Zhentao
    [J]. Qinghua Daxue Xuebao/Journal of Tsinghua University, 2009, 49 (SUPPL. 2): : 2193 - 2199
  • [6] Modeling and analysis of security protocols using role based specifications and Petri nets
    Bouroulet, Roland
    Devillers, Raymond
    Klaudel, Hanna
    Pelz, Elisabeth
    Pommereau, Franck
    [J]. APPLICATIONS AND THEORY OF PETRI NETS, 2008, 5062 : 72 - +
  • [7] MoSS: Modular Security Specifications Framework
    Herzberg, Amir
    Leibowitz, Hemi
    Syta, Ewa
    Wrotniak, Sara
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT III, 2021, 12827 : 33 - 63
  • [8] ProToc-An Universal Language for Security Protocols Specifications
    Grosser, A.
    Kurkowski, M.
    Piatkowski, J.
    Szymoniak, S.
    [J]. SOFT COMPUTING IN COMPUTER AND INFORMATION SCIENCE, 2015, 342 : 237 - 248
  • [9] On the semantics of Alice&Bob specifications of security protocols
    Caleiro, Carlos
    Vigano, Luca
    Basin, David
    [J]. THEORETICAL COMPUTER SCIENCE, 2006, 367 (1-2) : 88 - 122
  • [10] Modeling and Analysis of Agent-Based Specifications of Security Protocols Using CSANs and PDETool
    Akbarzadeh, Mojtaba
    Azgomi, Mohammad Abdollahi
    [J]. 2009 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2009, : 151 - 155