Back to Search
Start Over
A compositional logic for proving security properties of protocols.
- Source :
-
Journal of Computer Security . 2003, Vol. 11 Issue 4, p677-721. 45p. - Publication Year :
- 2003
-
Abstract
- We present a logic for proving security properties of protocols that use nonces (randomly generated numbers that uniquely identify a protocol session) and public‐key cryptography. The logic, designed around a process calculus with actions for each possible protocol step, consists of axioms about protocol actions and inference rules that yield assertions about protocols composed of multiple steps. Although assertions are written using only steps of the protocol, the logic is sound in a stronger sense: each provable assertion about an action or sequence of actions holds in any run of the protocol that contains the given actions and arbitrary additional actions by a malicious attacker. This approach lets us prove security properties of protocols under attack while reasoning only about the sequence of actions taken by honest parties to the protocol. The main security‐specific parts of the proof system are rules for reasoning about the set of messages that could reveal secret data and an invariant rule called the “honesty rule”. [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISSN :
- 0926227X
- Volume :
- 11
- Issue :
- 4
- Database :
- Academic Search Index
- Journal :
- Journal of Computer Security
- Publication Type :
- Academic Journal
- Accession number :
- 10717225
- Full Text :
- https://doi.org/10.3233/JCS-2003-11407