Semantics and logic for security protocols
نویسندگان
چکیده
منابع مشابه
Semantics and logic for security protocols
This paper presents a sound BAN-like logic for reasoning about security protocols with theorem prover support. The logic has formulas for sending and receiving mes sages (with nonces, public and private encryptions etc.), and has both temporal and epistemic operators (describing the knowledge of participants). The logic’s semantics is based on strand spaces. Several (secrecy or authentication)...
متن کاملLanguage, Semantics, and Methods for Security Protocols
Security protocols help in establishing secure channels between communicating systems. Great care needs therefore to be taken in developing and implementing robust protocols. The complexity of security-protocol interactions can hide, however, security weaknesses that only a formal analysis can reveal. The last few years have seen the emergence of successful intensional, event-based, formal appr...
متن کاملOperational Semantics of Security Protocols
Based on a concise domain analysis we develop a formal semantics of security protocols. Its main virtue is that it is a generic model, in the sense that it is parameterized over e.g. the intruder model. Further characteristics of the model are a straightforward handling of parallel execution of multiple protocols, locality of security claims, the binding of local constants to role instances, an...
متن کاملUpdate Semantics of Security Protocols
We present a model-theoretic approach for reasoning about security protocols, applying recent insights from dynamic epistemic logics. This enables us to describe exactly the subsequent epistemic states of the agents participating in the protocol, using Kripke models and transitions between these based on updates of the agents’ beliefs associated with steps in the protocol. As a case study we wi...
متن کاملFormal verification logic for hybrid security protocols
Security communication protocols generally start with an authentication phase where the identities of the involved parties are established. Next a session key is generated for use with some symmetric cryptographic algorithm to secure the actual transmission. In addition to the above, a mobile system may also require location privacy, link-security and/or end-to-end security. These extra require...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer Security
سال: 2009
ISSN: 1875-8924,0926-227X
DOI: 10.3233/jcs-2009-0348