Secrecy analysis in protocol composition logic

被引:0
|
作者
Roy, Arnab [1 ]
Datta, Anupam [1 ]
Derek, Ante [1 ]
Mitchell, John C. [1 ]
Seifert, Jean-Pierre [2 ]
机构
[1] Stanford Univ, Dept Comp Sci, Stanford, CA 94305 USA
[2] Univ Innsbruck, Inst Comp Sci, A-6020 Innsbruck, Austria
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Extending a compositional protocol logic with an induction rule for secrecy, we prove soundness for a conventional symbolic protocol execution model, adapt and extend previous composition theorems, and illustrate the logic by proving properties of two key agreement protocols. The first example is a variant of the Needham-Schroeder protocol that illustrates the ability to reason about temporary secrets. The second example is Kerberos V5. The modular nature of the secrecy and authentication proofs for Kerberos makes it possible to reuse proofs about the basic version of the protocol for the PKINIT version that uses public-key infrastructure instead of shared secret keys in the initial steps.
引用
收藏
页码:197 / +
页数:3
相关论文
共 50 条
  • [1] Protocol Composition Logic (PCL)
    Datta, Anupam
    Derek, Ante
    Mitchell, John C.
    Roy, Arnab
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 172 : 311 - 358
  • [2] Secrecy logic: S-secrecy structures
    Voutsadakis, George
    [J]. TURKISH JOURNAL OF MATHEMATICS, 2012, 36 (01) : 1 - 27
  • [3] Secrecy analysis of security protocol based on reachability relation
    Gu, Yong-Gen
    Fu, Yu-Xi
    Zhu, Han
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2007, 30 (02): : 255 - 261
  • [4] SECRECY LOGIC: PROTOALGEBRAIC S-SECRECY LOGICS
    Voutsadakis, George
    [J]. REPORTS ON MATHEMATICAL LOGIC, 2012, 47 : 3 - 28
  • [5] Hierarchical Protocol Analysis by Temporal Logic
    冯玉琳
    [J]. Journal of Computer Science & Technology, 1988, (01) : 56 - 69
  • [6] A new method of formalizing anonymity based on protocol composition logic
    Feng, Tao
    Han, Shining
    Guo, Xian
    Ma, Donglin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) : 1132 - 1140
  • [7] Protocol-independent secrecy
    Millen, J
    Ruess, H
    [J]. 2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2000, : 110 - 119
  • [8] Inferences on honesty in compositional logic for protocol analysis
    Hasebe, K
    Okada, M
    [J]. SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2004, 3233 : 65 - 86
  • [9] MODELING ADVERSARIES IN A LOGIC FOR SECURITY PROTOCOL ANALYSIS
    Halpern, Joseph Y.
    Pucella, Riccardo
    [J]. LOGICAL METHODS IN COMPUTER SCIENCE, 2012, 8 (01)
  • [10] Analysis of Cryptographic Protocol by Dynamic Epistemic Logic
    Chen, Xiaojuan
    Deng, Huiwen
    [J]. IEEE ACCESS, 2019, 7 : 29981 - 29988