Clap, a Simple Language for Cryptographic Protocols
نویسنده
چکیده
We describe the design of Clap, a simple speciication language devoted to cryptographic protocols (exclusively). Its main design principle is that it should be not only possible, but relatively easy, to prove security properties of Clap protocols automatically on a machine. To this end, Clap is very restricted. We can think of Clap as isolating what can be thought as a set of essential programming constructs and some essential speciication phrases needed in the domain of cryptographic protocols. It is paradoxical but important to note that, in proving security properties, the main strength of Clap is its absence of unneeded features. We then describe how actual implementations can be automatically extracted from Clap speciications.
منابع مشابه
A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملProtoViz: A Simple Security Protocol Visualization
This report describes ProtoViz, a small Java applet used for rudimentary visualization of security protocols. The applet parses protocol descriptions written in a simple specification language and builds an animated visualization from this description using a simple visual grammar. The user can then play the animation to watch the protocol “in action”, and is able to easily modify parts of the ...
متن کاملA Generalized Two-Phase Analysis of Knowledge Flows in Security Protocols
We introduce knowledge flow analysis, a simple and flexible formalism for checking cryptographic protocols. Knowledge flows provide a uniform language for expressing the actions of principals, assumptions about intruders, and the properties of cryptographic primitives. Our approach enables a generalized two-phase analysis: we extend the two-phase theory by identifying the necessary and sufficie...
متن کاملPrivacy, Abstract Encryption and Protocols: An ASM Model - Part I
We introduce an executable formal model of abstract encryption using the specification language AsmL, based on Abstract State Machines of Gurevich, providing a simple executable models for cryptographic protocols. We show strong universality properties of our descriptions of patterns, protocol roles and environment behaviors—no ASM program can do better, given the same information.
متن کاملDesign of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007