Measuring protocol strength with security goals

被引:4
|
作者
Rowe, Paul D. [1 ]
Guttman, Joshua D. [1 ]
Liskov, Moses D. [1 ]
机构
[1] Mitre Corp, Burlington Rd, Bedford, MA 01730 USA
关键词
Partial Order; Atomic Formula; Trust Third Party; Cryptographic Protocol; Security Goal;
D O I
10.1007/s10207-016-0319-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Flaws in published standards for security protocols are found regularly, often after systems implementing those standards have been deployed. Because of deployment constraints and disagreements among stakeholders, different fixes may be proposed and debated. In this process, security improvements must be balanced with issues of functionality and compatibility. This paper provides a family of rigorous metrics for protocol security improvements. These metrics are sets of first-order formulas in a goal language associated with a protocol . The semantics of is compatible with many ways to analyze protocols, and some metrics in this family are supported by many protocol analysis tools. Other metrics are supported by our Cryptographic Protocol Shapes Analyzer cpsa. This family of metrics refines several "hierarchies" of security goals in the literature. Our metrics are applicable even when, to mitigate a flaw, participants must enforce policies that constrain protocol execution. We recommend that protocols submitted to standards groups characterize their goals using formulas in , and that discussions comparing alternative protocol refinements measure their security in these terms.
引用
收藏
页码:575 / 596
页数:22
相关论文
共 50 条
  • [41] Unity is strength - Uniting Common Goals
    Lingelbach, Sabine
    [J]. RADIOLOGE, 2022, 62 (04): : 365 - 365
  • [42] Corporate security: Aligning a security program with corporate goals and objectives.
    DePasquale, S
    [J]. ENFORCEMENT AND SECURITY TECHNOLOGIES, 1998, 3575 : 220 - 231
  • [43] Industrial strength security
    Nelson, Richard
    [J]. IEEE INSTRUMENTATION & MEASUREMENT MAGAZINE, 2019, 22 (06) : 33 - 34
  • [44] MEASURING MUSCLE STRENGTH
    VANDERPLOEG, RJO
    OOSTERHUIS, HJGH
    REUVEKAMP, J
    [J]. JOURNAL OF NEUROLOGY, 1984, 231 (04) : 200 - 203
  • [45] MEASURING TIE STRENGTH
    MARSDEN, PV
    CAMPBELL, KE
    [J]. SOCIAL FORCES, 1984, 63 (02) : 482 - 501
  • [46] Measuring the Strength of Mice
    Deacon, Robert M. J.
    [J]. JOVE-JOURNAL OF VISUALIZED EXPERIMENTS, 2013, (76):
  • [47] Why the world needs millennium security goals
    Picciotto, Robert
    [J]. CONFLICT SECURITY & DEVELOPMENT, 2006, 6 (01) : 111 - 120
  • [48] Public key infrastructures that satisfy security goals
    Polk, WT
    Hastings, NE
    Malpani, A
    [J]. IEEE INTERNET COMPUTING, 2003, 7 (04) : 60 - 67
  • [49] GOALS IN DISCUSSING OLD-AGE SECURITY
    SCHMAHL, W
    [J]. ZEITSCHRIFT FUR GERONTOLOGIE, 1980, 13 (03): : 222 - 246
  • [50] Goals and Practices in Maintaining Information Systems Security
    Erlich, Zippy
    Zviran, Moshe
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2010, 4 (03) : 40 - 50