Intensional specifications of security protocols
نویسنده
چکیده
It is often diicult to specify exactly what a security protocol is intended to achieve, and there are many example of attacks on protocol which have been proved to satisfy thèwrong', or too weak a speciica-tion. Contrary to the usual approach of attempting to capture what it is that protocol achieves in abstract terms, we propose a readily automatable style of speciication which simply asserts that a node can only complete its part in a protocol run if the pattern of messages anticipated by the designer has occurred. While this intensional style of speciication does not replace more abstract ones such as conndentiality, it does appear to preclude a wide range of the styles of attack that are hardest to exclude by other means.
منابع مشابه
Security Protocols and their Properties
Specifications for security protocols range from informal narrations of message flows to formal assertions of protocol properties. This paper discusses those specifications, emphasizing authenticity and secrecy properties. It also suggests some gaps and some opportunities for further work. Some of them pertain to the traditional core of the field; others appear when we examine the context in wh...
متن کاملSecurity Protocols and Specifications
Specifications for security protocols range from informal narrations of message flows to formal assertions of protocol properties. This paper (intended to accompany a lecture at ETAPS ’99) discusses those specifications and suggests some gaps and some opportunities for further work. Some of them pertain to the traditional core of the field; others appear when we examine the context in which pro...
متن کاملLayered Specifications Framework for Analysis of Secure Protocols
We present a framework for specification and analysis of layered distributed algorithms, especially cryptographic protocols, with emphasis on security and fault-tolerance. Layered specifications is standard engineering practice, e.g. in networking (the OSI and TCP/IP protocol stacks). Layered specifications allow modular design of each layer, proving layer i meets specifications speci assuming ...
متن کاملLanguage, Semantics, and Methods for Security Protocols
Security protocols help in establishing secure channels between communicating systems. Great care needs therefore to be taken in developing and implementing robust protocols. The complexity of security-protocol interactions can hide, however, security weaknesses that only a formal analysis can reveal. The last few years have seen the emergence of successful intensional, event-based, formal appr...
متن کاملA Tool for Supporting Developers in Analyzing the Security of Web-Based Security Protocols
Security protocols are specified in natural language, are highlyconfigurable, and may not match the internal requirements of the development company. As a result, developers may misunderstand the specifications, may not grasp the security implications of configurations, and may deviate from the specifications introducing flaws. However, none of the existing techniques in discovering flaws provi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1996