Relating strands and multiset rewriting for security protocol analysis

被引:23
|
作者
Cervesato, I
Durgin, N
Mitchell, J
Lincoln, P
Scedrov, A
机构
关键词
D O I
10.1109/CSFW.2000.856924
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Formal analysis of security protocols is largely based on a set of assumptions commonly referred to as the Dolev-Yao model. Two formalisms that state the basic assumptions of this model are related here: strand spaces [6] and multiset rewriting with existential quntification [2, 5]. Although it is fairly intuitive that these two languages should bf equivalent ira some way: a number of modifications to each system are required to obtain a meaningful equivalence. We extend the strand formalism with a way of incrementally growing bundles in order to emulate an execution of a protocol with parametric strands. We omit the initialization part of the multiset rewriting setting, which formalizes the choice of initial data, such as shared public or private keys, and which has no counterpart in the strand space setting. The correspondence between the modified formalisms directly relates the intruder theory from the multiset rewriting formalism to the penetrator strands.
引用
收藏
页码:35 / 54
页数:5
相关论文
共 50 条
  • [31] Strands of security
    2005, Polygon Media Ltd. (37):
  • [32] Ultimately confluent rewriting systems. Parallel multiset-rewriting with permitting or forbidding contexts
    Alhazov, A
    Sburlan, D
    MEMBRANE COMPUTING, 2004, 3365 : 178 - 189
  • [33] An object-oriented coordination model based on multiset rewriting
    Bodeveix, JP
    Percebois, C
    Majoul, S
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS - PROCEEDINGS OF THE ISCA 9TH INTERNATIONAL CONFERENCE, VOLS I AND II, 1996, : 664 - 671
  • [34] Polymorphic Systems with Arrays, 2-Counter Machines and Multiset Rewriting
    Lazic, Ranko
    Newcomb, Tom
    Roscoe, Bill
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 138 (03) : 61 - 86
  • [35] Static analysis of XML security views and query rewriting
    Groz, Benoit
    Staworko, Slawomir
    Caron, Anne-Cecile
    Roos, Yves
    Tison, Sophie
    INFORMATION AND COMPUTATION, 2014, 238 : 2 - 29
  • [36] Multiset rewriting for the verification of depth-bounded processes with name binding
    Rosa-Velardo, Fernando
    Martos-Salgado, Maria
    INFORMATION AND COMPUTATION, 2012, 215 : 68 - 87
  • [37] Timed Multiset Rewriting and the Verification of Time-Sensitive Distributed Systems
    Kanovich, Max
    Kirigin, Tajana Ban
    Nigam, Vivek
    Scedrov, Andre
    Talcott, Carolyn
    FORMAL MODELING AND ANALYSIS OF TIMED SYSTEMS, FORMATS 2016, 2016, 9884 : 228 - 244
  • [38] A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace a nd Security Protocol Implementation Ontology
    He, Xudong
    Liu, Jiabing
    Huang, Chin-Tser
    Wang, Dejun
    Meng, Bo
    IEEE ACCESS, 2019, 7 : 131050 - 131067
  • [39] THE INTERROGATOR - PROTOCOL SECURITY ANALYSIS
    MILLEN, JK
    CLARK, SC
    FREEDMAN, SB
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) : 274 - 288
  • [40] Security Analysis of the SASI Protocol
    Cao, Tianjie
    Bertino, Elisa
    Lei, Hong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2009, 6 (01) : 73 - 77