A derivation system for security protocols and its logical formalization
- 23 January 2004
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 56 (10636900) , 109-125
- https://doi.org/10.1109/csfw.2003.1212708
Abstract
Many authentication and key exchange protocols are built using an accepted set of standard concepts such as Diffie-Hellman key exchange, nonces to avoid replay, certificates from an accepted authority, and encrypted or signed messages. We introduce a basic framework for deriving security protocols from such simple components. As a case study, we examine the structure of a family of key exchange protocols that includes station-to-station (STS), ISO-9798-3, just fast keying (JFK), IKE and related protocols, deriving all members of the family from two basic protocols using a small set of refinements and protocol transformations. As initial steps toward associating logical derivations with protocol derivations, we extend a previous security protocol logic with preconditions and temporal assertions. Using this logic, we prove the security properties of the standard signature based challenge-response protocol and the Diffie-Hellman key exchange protocol. The ISO-9798-3 protocol is then proved correct by composing the correctness proofs of these two simple protocols.Keywords
This publication has 15 references indexed in Scilit:
- Handbook of Applied CryptographyPublished by Taylor & Francis ,2018
- Some new attacks upon security protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A model of computation for the NRL Protocol AnalyzerPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Entity Authentication and Key DistributionPublished by Springer Nature ,2001
- The NRL Protocol Analyzer: An OverviewThe Journal of Logic Programming, 1996
- An attack on the Needham-Schroeder public-key authentication protocolInformation Processing Letters, 1995
- Systematic design of a family of attack-resistant authentication protocolsIEEE Journal on Selected Areas in Communications, 1993
- The chemical abstract machineTheoretical Computer Science, 1992
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983
- New directions in cryptographyIEEE Transactions on Information Theory, 1976