Analysing the security of a non-repudiation communication protocol with mandatory proof of receipt

نویسندگان

  • Tom Coffey
  • Puneet Saidha
  • Peter Burrows
چکیده

Non-repudiation is a security service concerned with preventing a denial by one of the principals involved in a communication of having participated in all or part of the communication. Principals exchange evidence information, which proves their participation in the communication. The evidence is digitally signed, making it non-forgeable and undeniable. In this paper, a non-repudiation communication protocol with mandatory proof of receipt is formally analysed. The verification technique used in the analysis applies a modal logic of knowledge and belief to prove the correctness of the protocol. This involves a process of deductive reasoning, where the desired protocol goals are deduced by applying a set of axioms, theorems and inference rules to the assumptions and message exchanges of the protocol. If the protocol is shown to fulfil its goals it can be deemed to be correct and secure.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

متن کامل

Efficient and Secure Protocol in Fair Certified E-Mail Delivery

An efficient and secure protocol in certified e-mail delivery is proposed in this paper. With the widespread use of public Internet, communication via electronic mail (e-mail) becomes a convenience application instead of traditional manuscript letter. People can easily append his/her digital signature to the email in order to achieve the goal of non-repudiation of origin. However, the evidence ...

متن کامل

An Intensive Survey of Non-Repudiation Protocols

With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. Non-repudiation services must ensure that when Alice sends some information to Bob over a network, neither Alice nor Bob can deny having participated in a part or the whole of this communication. Therefore a non-repudiation protocol has to gen...

متن کامل

An intensive survey of fair non-repudiation protocols

With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. Nonrepudiation services must ensure that when Alice sends some information to Bob over a network, neither Alice nor Bob can deny having participated in a part or the whole of this communication. Therefore a fair non-repudiation protocol has to...

متن کامل

Secrecy in Security Protocols as Non Interference

Non Interference 8] has been proposed for modelling and analysing information ow in systems. In 4,7] we have indeed shown that the Non Interference property called NDC can be applied also in the area of network security, for the analysis of typical cryptographic protocol properties (e.g., authentication, non-repudiation). In this paper we extend the results of 4,7] by showing that NDC can be al...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003