Relating strands and multiset rewriting for security protocol analysis

被引:23
|
作者
Cervesato, I
Durgin, N
Mitchell, J
Lincoln, P
Scedrov, A
机构
关键词
D O I
10.1109/CSFW.2000.856924
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Formal analysis of security protocols is largely based on a set of assumptions commonly referred to as the Dolev-Yao model. Two formalisms that state the basic assumptions of this model are related here: strand spaces [6] and multiset rewriting with existential quntification [2, 5]. Although it is fairly intuitive that these two languages should bf equivalent ira some way: a number of modifications to each system are required to obtain a meaningful equivalence. We extend the strand formalism with a way of incrementally growing bundles in order to emulate an execution of a protocol with parametric strands. We omit the initialization part of the multiset rewriting setting, which formalizes the choice of initial data, such as shared public or private keys, and which has no counterpart in the strand space setting. The correspondence between the modified formalisms directly relates the intruder theory from the multiset rewriting formalism to the penetrator strands.
引用
收藏
页码:35 / 54
页数:5
相关论文
共 50 条
  • [41] A security analysis of the OAuth protocol
    Yang, Feng
    Manoharan, Sathiamoorthy
    2013 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2013, : 271 - 276
  • [42] Security Analysis of SKI Protocol
    Babvey, Pouria
    Yajam, Habib Allah
    Eghlidos, Taraneh
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 199 - 203
  • [43] Analysis of a security protocol in μCRL
    Pang, J
    FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2002, 2495 : 396 - 400
  • [44] Fluid Computing - Interest-based Communication in Dataflow/Multiset Rewriting Computing
    de Mello Junior, Rui Rodrigues
    de Araujo, Leandro Santiago
    Cadette Dutra, Diego Leonel
    Louis Paillard, Gabriel Antoine
    de Amorim, Claudio Luis
    Galvao Franca, Felipe Maia
    PROCEEDINGS OF THE 10TH EURO-AMERICAN CONFERENCE ON TELEMATICS AND INFORMATION SYSTEMS (EATIS 2020), 2020,
  • [45] Security analysis of the MPOA protocol
    Rampal, S
    Wang, CX
    IEEE SOUTHEASTCON '99, PROCEEDINGS, 1999, : 102 - 105
  • [46] Conditional Observational Equivalence and Off-line Guessing Attacks in Multiset Rewriting
    Paradzik, Petar
    Derek, Ante
    2022 IEEE 35TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2022), 2022, : 1 - 16
  • [47] Relating Nominal and Higher-Order Rewriting
    Dominguez, Jesus
    Fernandez, Maribel
    MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 2014, PT I, 2014, 8634 : 244 - 255
  • [48] Rewriting the book on homeland security
    不详
    AVIATION WEEK & SPACE TECHNOLOGY, 2002, 156 (02): : 436 - 436
  • [49] Rewriting for cryptographic protocol verification
    Genet, T
    Klay, F
    AUTOMATED DEDUCTION - CADE-17, 2000, 1831 : 271 - 290
  • [50] Multi-level modelling via stochastic multi-level multiset rewriting
    Oury, Nicolas
    Plotkin, Gordon
    MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE, 2013, 23 (02) : 471 - 503