Measuring protocol strength with security goals

被引:0
|
作者
Paul D. Rowe
Joshua D. Guttman
Moses D. Liskov
机构
[1] The MITRE Corporation,
关键词
Partial Order; Atomic Formula; Trust Third Party; Cryptographic Protocol; Security Goal;
D O I
暂无
中图分类号
学科分类号
摘要
Flaws in published standards for security protocols are found regularly, often after systems implementing those standards have been deployed. Because of deployment constraints and disagreements among stakeholders, different fixes may be proposed and debated. In this process, security improvements must be balanced with issues of functionality and compatibility. This paper provides a family of rigorous metrics for protocol security improvements. These metrics are sets of first-order formulas in a goal language GL(Π)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathcal {GL}(\varPi )$$\end{document} associated with a protocol Π\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\varPi $$\end{document}. The semantics of GL(Π)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathcal {GL}(\varPi )$$\end{document} is compatible with many ways to analyze protocols, and some metrics in this family are supported by many protocol analysis tools. Other metrics are supported by our Cryptographic Protocol Shapes Analyzer cpsa. This family of metrics refines several “hierarchies” of security goals in the literature. Our metrics are applicable even when, to mitigate a flaw, participants must enforce policies that constrain protocol execution. We recommend that protocols submitted to standards groups characterize their goals using formulas in GL(Π)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathcal {GL}(\varPi )$$\end{document}, and that discussions comparing alternative protocol refinements measure their security in these terms.
引用
收藏
页码:575 / 596
页数:21
相关论文
共 50 条
  • [1] Measuring protocol strength with security goals
    Rowe, Paul D.
    Guttman, Joshua D.
    Liskov, Moses D.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (06) : 575 - 596
  • [2] Security Goals and Protocol Transformations
    Guttman, Joshua D.
    [J]. THEORY OF SECURITY AND APPLICATIONS, 2012, 6993 : 130 - 147
  • [3] Establishing and preserving protocol security goals
    Guttman, Joshua D.
    [J]. JOURNAL OF COMPUTER SECURITY, 2014, 22 (02) : 203 - 267
  • [4] Cross-Tool Semantics for Protocol Security Goals
    Guttman, Joshua D.
    Ramsdell, John D.
    Rowe, Paul D.
    [J]. SECURITY STANDARDISATION RESEARCH, SSR 2016, 2016, 10074 : 32 - 61
  • [5] Measuring global water security towards sustainable development goals
    Gain, Animesh K.
    Giupponi, Carlo
    Wada, Yoshihide
    [J]. ENVIRONMENTAL RESEARCH LETTERS, 2016, 11 (12):
  • [6] Understanding security goals provided by crypto-protocol implementations
    Jürjens, J
    [J]. ICSM 2005: PROCEEDINGS OF THE 21ST IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, 2005, : 643 - 646
  • [7] Trust Model for Measuring Security Strength of Cloud Computing Service
    Shaikh, Rizwana
    Sasikumar, M.
    [J]. INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA), 2015, 45 : 380 - 389
  • [8] Establishing a reproducible protocol for measuring index active extension strength
    Matter-Parrat, V.
    Diaz, J. J. Hidalgo
    Collon, S.
    Botero, S. Salazar
    Prunieres, G.
    Ichihara, S.
    Facca, S.
    Liverneaux, P.
    [J]. JOURNAL OF HAND SURGERY-EUROPEAN VOLUME, 2017, 42 (02) : 165 - 169
  • [9] A rippling-based difference reduction technique to automatically prove security protocol goals
    López, JC
    Monroy, R
    [J]. ADVANCES IN ARTIFICIAL INTELLIGENCE - IBERAMIA 2004, 2004, 3315 : 364 - 374
  • [10] Measuring Developer Goals
    Ferrari-Church, Benjamin
    Egelman, Carolyn
    [J]. IEEE SOFTWARE, 2024, 41 (05) : 14 - 19