On the semantics of Alice&Bob specifications of security protocols

被引:16
|
作者
Caleiro, Carlos [1 ]
Vigano, Luca
Basin, David
机构
[1] CLC, Dept Math, Lisbon, Portugal
[2] SQIG IT, IST, Lisbon, Portugal
关键词
security protocols; protocol models; message sequences; Alice&Bob specifications; Spi calculus;
D O I
10.1016/j.tcs.2006.08.041
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the context of security protocols, the so-called Alice&Bob notation is often used to describe the messages exchanged between honest principals in successful protocol runs. While intuitive, this notation is ambiguous in its description of the actions taken by principals, in particular with respect to the conditions they must check when executing their roles and the actions they must take when the checks fail. In this paper, we investigate the semantics of protocol specifications in Alice&Bob notation. We provide both a denotational and an operational semantics for such specifications, rigorously accounting for these conditions and actions. Our denotational semantics is based on a notion of incremental symbolic runs, which reflect the data possessed by principals and how this data increases monotonically during protocol execution. We contrast this with a standard formalization of the behavior of principals, which directly interprets message exchanges as sequences of atomic actions. In particular, we provide a complete characterization of the situations where this simpler, direct approach is adequate and prove that incremental symbolic runs are more expressive in general. Our operational semantics, which is guided by the denotational semantics, implements each role of the specified protocol as a sequential process of the pattern-matching spi calculus. (c) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:88 / 122
页数:35
相关论文
共 50 条
  • [41] Alice and Bob: Reconciling Formal Models and Implementation
    Almousa, Omar
    Modersheim, Sebastian
    Vigano, Luca
    [J]. PROGRAMMING LANGUAGES WITH APPLICATIONS TO BIOLOGY AND SECURITY: ESSAYS DEDICATED TO PIERPAOLO DEGANO ON THE OCCASION OF HIS 65TH BIRTHDAY, 2015, 9465 : 66 - 85
  • [42] Provably correct Java']Java implementations of Spi Calculus security protocols specifications
    Pironti, Alfredo
    Sisto, Riccardo
    [J]. COMPUTERS & SECURITY, 2010, 29 (03) : 302 - 314
  • [43] Benny Andrews, Alice Neel, Bob Thompson
    Molarsky, Mona
    [J]. ARTNEWS, 2012, 111 (05): : 109 - 109
  • [44] Can Alice and Bob Guarantee Output to Carol?
    Alon, Bar
    Omri, Eran
    Venkitasubramaniam, Muthuramakrishnan
    [J]. ADVANCES IN CRYPTOLOGY, PT V, EUROCRYPT 2024, 2024, 14655 : 32 - 61
  • [45] Experience report: How to extract security protocols' specifications from C libraries
    Sandoval, Itzel Vazquez
    Lenzini, Gabriele
    [J]. 2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2018), VOL 2, 2018, : 719 - 724
  • [46] Modeling and analysis of security protocols using role based specifications and Petri nets
    Bouroulet, Roland
    Devillers, Raymond
    Klaudel, Hanna
    Pelz, Elisabeth
    Pommereau, Franck
    [J]. APPLICATIONS AND THEORY OF PETRI NETS, 2008, 5062 : 72 - +
  • [47] When classical bob meets quantum alice
    Marks, Paul
    [J]. NEW SCIENTIST, 2007, 196 (2626) : 32 - 32
  • [48] THE SEMANTICS OF SHARED SUBMODULES SPECIFICATIONS
    BLUM, EK
    PARISIPRESICCE, F
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1985, 185 : 359 - 373
  • [49] Refining the Semantics of Epistemic Specifications
    Su, Ezgi Iraz
    [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2021, (345): : 113 - 126
  • [50] RELATIONAL SPECIFICATIONS AND OBSERVATIONAL SEMANTICS
    ASTESIANO, E
    REGGIO, G
    WIRSING, M
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1986, 233 : 209 - 217