Formal analysis of a secure communication channel: Secure core-email protocol

被引:0
|
作者
Zhou, D [1 ]
Chin, SK [1 ]
机构
[1] Syracuse Univ, Dept Elect Engn & Comp Sci, Syracuse, NY 13244 USA
来源
FM'99-FORMAL METHODS | 1999年 / 1708卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
To construct a highly-assured implementation of secure communication channels we must have dear definitions of the security services, the channels, and under what assumptions these channels provide the desired services. We formally define secure channel services and develop a detailed example. The example is a core protocol common to a family of secure email systems. We identify the necessary properties of cryptographic algorithms to ensure that the email protocol is secure, and we verify that the email protocol provides secure services under these assumptions. We carry out the definitions and verifications in higher-order logic using the HOL theorem-prover. All our definitions and theorems are conservative extensions to the logic of HOL.
引用
收藏
页码:758 / 775
页数:18
相关论文
共 50 条
  • [1] Formal Specifications and Verification of a Secure Communication Protocol Model
    Xia Yang 1
    2. Research Center for Information Network Security
    JournalofSystemsEngineeringandElectronics, 2003, (02) : 90 - 97
  • [2] A case (study) for usability in secure email communication
    Kapadia, Apu
    IEEE SECURITY & PRIVACY, 2007, 5 (02) : 80 - 84
  • [3] Formal Verification of a Dynamic Multi-factor Secure Communication Protocol
    Scott, Kyler R.
    Khatri, Sunil P.
    Ghrayeb, Ali
    3RD INTERNATIONAL CONFERENCE ON SMART GRID AND RENEWABLE ENERGY (SGRE), 2022,
  • [4] Secure Communication Protocol for a Low-Bandwidth Audio Channel
    Berchtold, Waldemar
    Lieb, Patrick
    Steinebach, Martin
    2017 25TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2017, : 2206 - 2210
  • [5] Secure Protocol for VANETs Communication
    Kumar, Manish
    Patil, Shriniwas
    Parmar, Keyur
    2022 IEEE 19TH INDIA COUNCIL INTERNATIONAL CONFERENCE, INDICON, 2022,
  • [6] Formal Analysis of Secure Routing Protocol for Ad Hoc Networks
    Niu, Qiuna
    2009 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP 2009), 2009, : 171 - 174
  • [7] PriviPK: Certificate-less and secure email communication
    AlSabah, Mashael
    Tomescu, Alin
    Lebedev, Ilia
    Serpanos, Dimitrios
    Devadas, Srini
    COMPUTERS & SECURITY, 2017, 70 : 1 - 15
  • [8] A secure and efficient communication resume protocol for secure wireless networks
    Kim, K
    Hong, J
    Lim, J
    DISTRIBUTED APPLICATIONS AND INTEROPERABLE SYSTEMS, 2005, 3543 : 157 - 168
  • [9] The Secure Communication Interoperability Protocol (SCIP) over an HF radio channel
    Alvermann, John M.
    Kurdziel, Michael T.
    Furman, William N.
    MILCOM 2006, VOLS 1-7, 2006, : 1022 - +
  • [10] FORMAL VERIFICATION OF THE SECURE SOCKETS LAYER PROTOCOL
    Tobarra, Llanos
    Cazorla, Diego
    Pardo, J. Jose
    Cuartero, Fernando
    ICEIS 2008: PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL ISAS-2: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, VOL 2, 2008, : 246 - 252