DocumentCode
2301769
Title
Reasoning about Cryptographic Protocols in Observational Theories
Author
Zaabar, Imen ; Berregeb, Narjes
Author_Institution
Tunisia Polytech. Sch., Marsa
fYear
2007
fDate
26-29 March 2007
Firstpage
539
Lastpage
548
Abstract
A lot of models have been applied to the analysis of cryptographic protocols. Some of them formalize security properties as reachability and some others express them as observational equivalences. In this paper, our intent is to present the main ideas for reasoning about cryptographic protocols in the framework of observational theories. We model protocols by term rewriting systems and express secrecy and authentication properties by observational equivalences, in a way close to spi-calculus (Abadi and Gordon, 1999)
Keywords
cryptographic protocols; rewriting systems; cryptographic protocols; observational equivalence; observational theories; security protocols; term rewriting; Algebra; Authentication; Automation; Communication system security; Computer security; Conferences; Cryptographic protocols; Cryptography; National security; Systems engineering and theory; Observational equivalence.; Security Protocols; Term rewriting; Verification;
fLanguage
English
Publisher
ieee
Conference_Titel
Engineering of Computer-Based Systems, 2007. ECBS '07. 14th Annual IEEE International Conference and Workshops on the
Conference_Location
Tucson, AZ
Print_ISBN
0-7695-2772-8
Type
conf
DOI
10.1109/ECBS.2007.60
Filename
4148972
Link To Document