Back to Search
Start Over
A Meta-Notation for Protocol Analysis
- Source :
- CSFW
- Publication Year :
- 1988
- Publisher :
- Carnegie Mellon University, 1988.
-
Abstract
- Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model". In this paper, we use a multiset rewriting formalism, based on linear logic, to state the basic assumptions of this model. A characteristic of our formalism is the way that existential quantification provides a succinct way of choosing new values, such as new keys or nonces. We define a class of theories in this formalism that correspond to finite-length protocols, with a bounded initialization phase but allowing unboundedly many instances of each protocol role (e.g., client, sewer; initiator or responder). Undecidability is proved for a restricted class of these protocols, and PSPACE-completeness is claimed for a class further restricted to have no new data (nonces). Since it is a fragment of linear logic, we can use our notation directly as input to linear logic tools, allowing us to do proof search for attacks with relatively little programming effort, and to formally verify protocol transformations and optimizations.
- Subjects :
- FOS: Computer and information sciences
Theoretical computer science
Computer science
Programming language
Existential quantification
Initialization
Protocol analysis
Notation
computer.software_genre
Linear logic
TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES
Bounded function
Universal composability
89999 Information and Computing Sciences not elsewhere classified
computer
Cryptographic nonce
Subjects
Details
- Database :
- OpenAIRE
- Journal :
- CSFW
- Accession number :
- edsair.doi.dedup.....16b74cfebd2ec4a11e77fab5d090940c
- Full Text :
- https://doi.org/10.1184/r1/6587588.v1