Measuring protocol strength with security goals

被引:4
|
作者
Rowe, Paul D. [1 ]
Guttman, Joshua D. [1 ]
Liskov, Moses D. [1 ]
机构
[1] Mitre Corp, Burlington Rd, Bedford, MA 01730 USA
关键词
Partial Order; Atomic Formula; Trust Third Party; Cryptographic Protocol; Security Goal;
D O I
10.1007/s10207-016-0319-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Flaws in published standards for security protocols are found regularly, often after systems implementing those standards have been deployed. Because of deployment constraints and disagreements among stakeholders, different fixes may be proposed and debated. In this process, security improvements must be balanced with issues of functionality and compatibility. This paper provides a family of rigorous metrics for protocol security improvements. These metrics are sets of first-order formulas in a goal language associated with a protocol . The semantics of is compatible with many ways to analyze protocols, and some metrics in this family are supported by many protocol analysis tools. Other metrics are supported by our Cryptographic Protocol Shapes Analyzer cpsa. This family of metrics refines several "hierarchies" of security goals in the literature. Our metrics are applicable even when, to mitigate a flaw, participants must enforce policies that constrain protocol execution. We recommend that protocols submitted to standards groups characterize their goals using formulas in , and that discussions comparing alternative protocol refinements measure their security in these terms.
引用
收藏
页码:575 / 596
页数:22
相关论文
共 50 条
  • [31] The OSD security protocol
    Factor, Michael
    Nagle, David
    Naor, Dalit
    Riedel, Erik
    Satran, Julian
    [J]. THIRD INTERNATIONAL IEEE SECURITY IN STORAGE WORKSHOP, PROCEEDINGS, 2006, : 29 - +
  • [32] ON SECURITY OF THE SESPAKE PROTOCOL
    Alekseev, E. K.
    Smyshlyaev, S., V
    [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2020, (50): : 5 - 41
  • [33] Internet security protocol
    Markham, T
    [J]. DR DOBBS JOURNAL, 1997, 22 (06): : 70 - +
  • [34] On the Security of the Dandelion Protocol
    Goncalves, Brian
    Mashatan, Atefeh
    [J]. MATHEMATICS, 2022, 10 (07)
  • [35] Measuring the level of security introduced by security patterns
    Fernandez, Eduardo B.
    Yoshioka, Nobukazu
    Washizaki, Hironori
    VanHilst, Michael
    [J]. FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 565 - 568
  • [36] Measuring seated hip extensor strength using a handheld dynamometer: an examination of the reliability and validity of the protocol
    Seko, Toshiaki
    Kumamoto, Tsuneo
    Miura, Sayo
    Kobayashi, Takumi
    Takahashi, Yui
    Kaneko, Ryousuke
    Morino, Akira
    Ito, Toshikazu
    [J]. JOURNAL OF PHYSICAL THERAPY SCIENCE, 2015, 27 (07) : 2179 - 2182
  • [37] Measuring Security Practices and How They Impact Security
    DeKoven, Louis F.
    Randall, Audrey
    Mirian, Ariana
    Akiwate, Gautam
    Blume, Ansel
    Saul, Lawrence K.
    Schulman, Aaron
    Voelker, Geoffrey M.
    Savage, Stefan
    [J]. IMC'19: PROCEEDINGS OF THE 2019 ACM INTERNET MEASUREMENT CONFERENCE, 2019, : 36 - 49
  • [38] Managing Security: The Security Content Automation Protocol
    Radack, Shirley
    Kuhn, Rick
    [J]. IT PROFESSIONAL, 2011, 13 (01) : 9 - 11
  • [39] Unity is Strength - Uniting common Goals
    Lingelbach, Sabine
    [J]. RADIOLOGIE, 2022, 62 (04): : 365 - 365
  • [40] Strength and power goals for competitive rowers
    McNeely, E
    Sandler, D
    Bamel, S
    [J]. STRENGTH AND CONDITIONING JOURNAL, 2005, 27 (03) : 10 - 15