Back to Search Start Over

Secure Protocol Composition.

Authors :
Datta, Anupam
Derek, Ante
Mitchell, John C.
Pavlovic, Dusko
Source :
ENTCS: Electronic Notes in Theoretical Computer Science; Oct2003, Vol. 83, p201-226, 26p
Publication Year :
2003

Abstract

Abstract: This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting from basic security components, using a sequence of refinements and transformations, just like logical proofs are derived starting from axioms, using proof rules and transformations. The claim is that in practice, many protocols are already derived in such a way, but informally. Capturing this practice in a suitable formalism turns out to be a considerable task. The present paper proposes rules for composing security protocols from given security components. In general, security protocols are, of course, not compositional: information revealed by one may interfere with the security of the other. However, annotating protocol steps by pre- and post-conditions, allows secure sequential composition. Establishing that protocol components satisfy each other’s invariants allows more general forms of composition, ensuring that the individually secure sub-protocols will not interact insecurely in the composite protocol. The applicability of the method is demonstrated on modular derivations of two standard protocols, together with their simple security properties. [Copyright &y& Elsevier]

Details

Language :
Portuguese
ISSN :
15710661
Volume :
83
Database :
Supplemental Index
Journal :
ENTCS: Electronic Notes in Theoretical Computer Science
Publication Type :
Periodical
Accession number :
94907564
Full Text :
https://doi.org/10.1016/S1571-0661(03)50011-1