Extending the Strand Space Model for Security Protocol Composition
نویسنده
چکیده
We extend the regular strand space model with specialized terms and we provide a message construction schema for security protocols, based on grammatical rules. Using the extended model, we present two security protocol specification models that are used by the authors in the sequential and parallel composition of security protocols.
منابع مشابه
Extending the Strand Space Method with Timestamps: Part I the Theory
In this paper, we present two extensions of the strand space method to model Kerberos V. First, we include time and timestamps to model security protocols with timestamps: we relate a key to a crack time and combine it with timestamps in order to define a notion of recency. Therefore, we can check replay attacks in this new framework. Second, we extend the classic strand space theory to model p...
متن کاملExtending the Strand Space Method with Timestamps: Part II Application to Kerberos V
In this paper, we show how to use the novel extended strand space method to verify Kerberos V. First, we formally model novel semantical features in Kerberos V such as timestamps and protocol mixture in this new framework. Second, we apply unsolicited authentication test to prove its secrecy and authentication goals of Kerberos V. Our formalization and proof in this case study have been mechani...
متن کاملAdding Branching to the Strand Space Model
The strand space model is one of the most successful and widely used formalisms for analysing security protocols. This might seem surprising given that the model is not able to reflect choice points in a protocol execution: the key concept in the strand space model is that of a bundle, which models exactly one possible execution of a security protocol. Inspired by the branching processes of Pet...
متن کاملA Heuristic State Space Search Model for Security Protocol Verification
The vulnerability and importance of computers, robots, internet etc, demand the employment of exceedingly reliable security protocols. E-Business can not be encouraged with susceptible underlying security protocols. We present a heuristic state space search model for automatic security protocol verification. Our model exploits its knowledge of the search space and intelligently enhances the eff...
متن کاملHonest Ideals on Strand Spaces
In security protocol analysis, it is important to learn general principles that limit the abilities of an attacker, and that can be applied repeatedly to a variety of protocols. We introduce the notion of an ideal—a set of messages closed under encryption and invariant under composition with arbitrary messages—to express such principles. In conjunction with the strand space formalism, we use th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008