Article

The Game of the Name in Cryptographic Tables

08/1999; DOI: 10.1007/3-540-46674-6_3
Source: CiteSeer

ABSTRACT We present a name-passing calculus that can be regarded as a simplified pi-calculus equipped with a cryptographic table. The latter is a data structure representing the relationships among names. We apply the calculus to the modelling and verification of secrecy and authenticity properties in cryptographic protocols relying on symmetric shared keys. Following classical approaches [8], we formulate the verification task as a reachability problem and prove its decidability assuming finite principals and bounds on the sorts of the messages synthesized by the attacker.

Download full-text

Full-text

Available from: Sanjiva Prasad, Jul 21, 2015
0 Followers
 · 
84 Views
  • Source
    • "These tools still sometimes limit the number of sessions to guarantee termination. Amadio and Prasad [7] note that authentication can be translated into secrecy, by using a judge process. The translation is limited in that only one message can be registered by the judge, so the verified authentication property is not exactly the same as ours. "
    [Show abstract] [Hide abstract]
    ABSTRACT: We present a new technique for verifying correspondences in security protocols. In particular, correspondences can be used to formalize authentication. Our technique is fully automatic, it can handle an unbounded number of sessions of the protocol, and it is efficient in practice. It significantly extends a previous technique for the verification of secrecy. The protocol is represented in an extension of the pi calculus with fairly arbitrary cryptographic primitives. This protocol representation includes the specification of the correspondence to be verified, but no other annotation. This representation is then translated into an abstract representation by Horn clauses, which is used to prove the desired correspondence. Our technique has been proved correct and implemented. We have tested it on various protocols from the literature. The experimental results show that these protocols can be verified by our technique in less than 1 s.
  • Source
    • "应用 Spi 演算方法分析对称密钥安全协议;Abadi 和 Blanchet [61] 应用 Spi 演算方法分析公开密钥安全 协议;Amadio 和 Prasad [62] "
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper is a survey on the twenty years development of security protocols research. The state of the art in the application of formal methods to the design and analysis of security protocols is presented. Some major
    Journal of Software 01/2003;
  • Source
Show more