Synthesizing Secure Protocols

نویسندگان

  • Véronique Cortier
  • Bogdan Warinschi
  • Eugen Zalinescu
چکیده

We propose a general transformation that maps a protocol secure in an extremely weak sense (essentially in a model where no adversary is present) into a protocol that is secure against a fully active adversary which interacts with an unbounded number of protocol sessions, and has absolute control over the network. The transformation works for arbitrary protocols with any number of participants, written with usual cryptographic primitives. Our transformation provably preserves a large class of security properties that contains secrecy and authenticity. An important byproduct contribution of this paper is a modular protocol development paradigm where designers focus their effort on an extremely simple execution setting – security in more complex settings being ensured by our generic transformation. Conceptually, the transformation is very simple, and has a clean, well motivated design. Each message is tied to the session for which it is intended via digital signatures and on-the-fly generated session identifiers, and prevents replay attacks by encrypting the messages under the recipient’s public key. Key-words: security protocols, signatures, public-key encryption ∗ LORIA, CNRS & INRIA project Cassis, Nancy, France. This work has been partly supported by the ACI Jeunes Chercheurs JC 9005 and the ACI Satin † Computer Science Department, University of Bristol Synthèse de protocoles sûrs Résumé : Nous proposons une transformation générale pour synthétiser des protocoles sûrs par construction. Notre transformation part d’un protocole sûr en un sens très faible (le protocole doit être sûr simplement lorsqu’il est exécuté une seule fois et sans adversaire) et produit un protocole sûr contre un adversaire contrôlant tous les échanges de messages sur le réseau durant un nombre illimité de sessions. Cette transformation fonctionne pour des protocoles arbitraires, avec un nombre quelconque de participants et des primitives cryptographiques usuelles. Nous prouvons la sécurité des protocoles synthétisés pour une large classe de propriété incluant le secret et l’authentification. Mots-clés : protocoles de sécurité, signatures, chiffrement publique Synthesizing secure protocols 3

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

Synthesis of Property-Preserving Mappings

System development often involves decisions about how a high-level design is to be implemented using primitives from a low-level platform. Certain decisions, however, may introduce undesirable behavior into the resulting implementation, possibly leading to a violation of a desired property that has already been established at the design level. In this paper, we introduce the problem of synthesi...

متن کامل

Guiding Distributed Systems Synthesis with Language-Based Security Policies

The distributed information systems we use every day are becoming more complex and interconnected. Can we trust them with our information? Currently there is no good way to check that distributed software uses information securely, even if we have the source code. Many mechanisms are available, but are error-prone: for example, encryption, various cryptographic protocols, access control, and re...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007