Protocol engineering principles for cryptographic protocols design

被引:0
|
作者
Dong, Ling [1 ,2 ]
Chen, Kefei [1 ,2 ]
Wen, Mi [1 ,2 ]
Zheng, Yanfei [1 ,2 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
[2] Natl Lab Modern Commun, Chengdu, Peoples R China
关键词
D O I
10.1109/SNPD.2007.441
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Design of cryptographic protocols especially authentication protocols remains error-prone, even for experts in this area Protocol engineering is a new notion introduced in this paper for cryptographic protocol design, which is derived from software engineering idea. We present and illustrate protocol engineering principles in three groups: cryptographic protocol security requirements analysis principles, detailed protocol design principles and provable security principles. Furthermore, we illustrate that some of the well-known Abadi and Needham's principles are ambiguous. This paper is useful in that it regards cryptographic protocol design as system engineering, hence it can efficiently indicate implicit assumptions behind cryptographic protocol design, and present operational principles on uncovering these subtleties. Although our principles are informal, but they are practical, and we believe that they will benefit other researchers.
引用
收藏
页码:641 / +
页数:2
相关论文
共 50 条
  • [1] Formal analysis and design principles of cryptographic protocols
    Xu, X.D.
    Yue, D.W.
    [J]. Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute of Posts and Telecommunications, 2001, 21 (03):
  • [2] Prudent engineering practice for cryptographic protocols
    Abadi, M
    Needham, R
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1996, 22 (01) : 6 - 15
  • [3] Design and analysis of cryptographic protocols for RFID
    State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    [J]. Jisuanji Xuebao, 2006, 4 (581-589):
  • [4] Some applications of polynomials for the design of cryptographic protocols
    Kushilevitz, E
    [J]. SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 1 - 13
  • [5] Simulation in cryptographic protocol design and analysis
    Su, N
    Zobel, RN
    Iwu, FO
    [J]. SIMULATION IN INDUSTRY, 2003, : 475 - 480
  • [6] Provable security for cryptographic protocols - Exact analysis and engineering applications
    Gray, JW
    Ip, KFE
    Lui, KS
    [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 45 - 58
  • [7] Domain Engineering for Automatic Analysis of Financial Applications of Cryptographic Protocols
    Georgieva, Lilia
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2010, 6052 : 428 - 428
  • [8] Design of cryptographic protocols by means of genetic algorithms techniques
    Zarza, Luis
    Pegueroles, Josep
    Soriano, Miguel
    Martinez, Rafael
    [J]. SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 316 - +
  • [9] Cryptographic protocol design concept with genetic algorithms
    Park, K
    Hong, CL
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2005, 3682 : 483 - 489
  • [10] Stateless Cryptographic Protocols
    Goyal, Vipul
    Maji, Hemanta K.
    [J]. 2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, : 678 - 687