Relating strands and multiset rewriting for security protocol analysis

被引:23
|
作者
Cervesato, I
Durgin, N
Mitchell, J
Lincoln, P
Scedrov, A
机构
关键词
D O I
10.1109/CSFW.2000.856924
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Formal analysis of security protocols is largely based on a set of assumptions commonly referred to as the Dolev-Yao model. Two formalisms that state the basic assumptions of this model are related here: strand spaces [6] and multiset rewriting with existential quntification [2, 5]. Although it is fairly intuitive that these two languages should bf equivalent ira some way: a number of modifications to each system are required to obtain a meaningful equivalence. We extend the strand formalism with a way of incrementally growing bundles in order to emulate an execution of a protocol with parametric strands. We omit the initialization part of the multiset rewriting setting, which formalizes the choice of initial data, such as shared public or private keys, and which has no counterpart in the strand space setting. The correspondence between the modified formalisms directly relates the intruder theory from the multiset rewriting formalism to the penetrator strands.
引用
收藏
页码:35 / 54
页数:5
相关论文
共 50 条
  • [1] Relating multiset rewriting and process algebras for security protocol analysis
    Bistarelli, Stefano
    Cervesato, Iliano
    Lenzini, Gabriele
    Martinelli, Fabio
    JOURNAL OF COMPUTER SECURITY, 2005, 13 (01) : 3 - 47
  • [2] Multiset rewriting and security protocol analysis
    Mitchell, JC
    REWRITING TECHNIQUES AND APPLICATIONS, 2002, 2378 : 19 - 22
  • [3] A comparison between strand spaces and multiset rewriting for security protocol analysis
    Cervesato, Iliano
    Durgin, Nancy A.
    Lincoln, Patrick D.
    Mitchell, John C.
    Scedrov, Andre
    JOURNAL OF COMPUTER SECURITY, 2005, 13 (02) : 265 - 316
  • [4] A comparison between strand spaces and multiset rewriting for security protocol analysis
    Cervesato, I
    Durgin, N
    Lincoln, P
    Mitchel, J
    Scedrov, A
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 356 - 383
  • [5] Relating process algebras and multiset rewriting for immediate decryption protocols
    Bistarelli, S
    Cervesato, I
    Lenzini, G
    Martinelli, F
    COMPUTER NETWORK SECURITY, 2003, 2776 : 86 - 99
  • [6] Security Protocol Analysis Based on Rewriting Approximation
    Liu, Nan
    Zhu, Wen-ye
    Zhu, Yue-fei
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 318 - 322
  • [7] Modular Multiset Rewriting
    Cervesato, Iliano
    Lam, Edmund S. L.
    LOGIC FOR PROGRAMMING, ARTIFICIAL INTELLIGENCE, AND REASONING, (LPAR-20 2015), 2015, 9450 : 515 - 531
  • [8] On the Complexity of Concurrent Multiset Rewriting
    Bertier, Marin
    Perrin, Matthieu
    Tedeschi, Cedric
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2016, 27 (01) : 67 - 83
  • [9] Generalized mapping for multiset rewriting systems
    Kharal, Athar
    Alshehri, Mansoor H.
    Bin Turki, Nasser
    Duraihem, Faisal Z.
    SOFT COMPUTING, 2021, 25 (17) : 11439 - 11448
  • [10] Generalized mapping for multiset rewriting systems
    Athar Kharal
    Mansoor H. Alshehri
    Nasser Bin Turki
    Faisal Z. Duraihem
    Soft Computing, 2021, 25 : 11439 - 11448