Back to Search Start Over

A compositional logic for proving security properties of protocols.

Authors :
Durgin, Nancy
Mitchell, John
Pavlovic, Dusko
Source :
Journal of Computer Security. 2003, Vol. 11 Issue 4, p677-721. 45p.
Publication Year :
2003

Abstract

We present a logic for proving security properties of protocols that use nonces (randomly generated numbers that uniquely identify a protocol session) and public‐key cryptography. The logic, designed around a process calculus with actions for each possible protocol step, consists of axioms about protocol actions and inference rules that yield assertions about protocols composed of multiple steps. Although assertions are written using only steps of the protocol, the logic is sound in a stronger sense: each provable assertion about an action or sequence of actions holds in any run of the protocol that contains the given actions and arbitrary additional actions by a malicious attacker. This approach lets us prove security properties of protocols under attack while reasoning only about the sequence of actions taken by honest parties to the protocol. The main security‐specific parts of the proof system are rules for reasoning about the set of messages that could reveal secret data and an invariant rule called the “honesty rule”. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
0926227X
Volume :
11
Issue :
4
Database :
Academic Search Index
Journal :
Journal of Computer Security
Publication Type :
Academic Journal
Accession number :
10717225
Full Text :
https://doi.org/10.3233/JCS-2003-11407