LoET-E: A Refined Theory for Proving Security Properties of Cryptographic Protocols
نویسندگان
چکیده
منابع مشابه
Proving Properties of Security Protocols by Induction
Informal justifications of security protocols involve arguing backwards that various events are impossible. Inductive definitions can make such arguments rigorous. The resulting proofs are complicated, but can be generated reasonably quickly using the proof tool Isabelle/HOL. There is no restriction to finite-state systems and the approach is not based on belief logics. Protocols are inductivel...
متن کاملA Compositional Logic for Proving Security Properties of Protocols
We present a logic for proving security properties of protocols that usenonces (randomly generated numbers that uniquely identify a protocol ses-sion) and public-key cryptography. The logic, designed around a processcalculus with actions for each possible protocol step, consists of axiomsabout protocol actions and inference rules that yield assertions about proto-cols compos...
متن کاملProving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified in detail, we cannot be certain what constitutes a flaw. Thanks to recent work by a number of researchers, security protocols can now be analyzed formally. The paper outlines the problem area, emphasizing the notion of...
متن کاملUsing SPIN to Verify Security Properties of Cryptographic Protocols
This paper explores the use of Spin for the veri cation of cryptographic protocol security properties. A general method is proposed to build a Promela model of the protocol and of the intruder capabilities. The method is illustrated showing the modeling of a classical case study, i.e. the Needham-Schroeder Public Key Authentication Protocol. Using the model so built, Spin can nd a known attack ...
متن کاملSecurity proofs of cryptographic protocols
We live in time of computers and scientific and technological progress but this time is also marked with many attacks on big Internet companies. So with expand of Internet people start to protect information that they exchange through Internet. In the Internet world it is necessary for systems as Internet banking, Internet shopping or e-commerce to secure private information that are transferre...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2019
ISSN: 2169-3536
DOI: 10.1109/access.2019.2915645