DocumentCode :
1836774
Title :
Automated composition of security protocols
Author :
Béla, Genge ; Ignat, Iosif ; Piroska, Haller
Author_Institution :
Electr. Eng. Dept., Univ. of Targu Mures, Targu Mures, Romania
fYear :
2009
fDate :
27-29 Aug. 2009
Firstpage :
251
Lastpage :
258
Abstract :
Determining if two protocols can be securely composed requires analyzing not only their additive properties but also their destructive properties. In this paper we propose a new composition method for constructing protocols based on existing ones found in the literature that can be fully automatized. The additive properties of the composed protocols are ensured by the composition of protocol preconditions and effects, denoting, respectively, the conditions that must hold for protocols to be executed and the conditions that hold after executing the protocols. The non-destructive property of the final composed protocol is verified by analyzing the independence of the involved protocols, a method proposed by the authors in their previous work. The fully automatized property is ensured by constructing a rich protocol model that contains explicit description of protocol preconditions, effects, generated terms and exchanged messages. The proposed method is validated by composing 17 protocol pairs and by verifying the correctness of the composed protocols with an existing tool.
Keywords :
cryptographic protocols; formal verification; set theory; additive property; automated security protocol composition; cryptographic protocol model; destructive property; message exchange; nondestructive property; protocol correctness verification; protocol description; set theory; Additives; Computer science; Computer security; Cryptographic protocols; Cryptography; Electronic commerce; Explosives; Human factors; IP networks; Routing protocols;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligent Computer Communication and Processing, 2009. ICCP 2009. IEEE 5th International Conference on
Conference_Location :
Cluj-Napoca
Print_ISBN :
978-1-4244-5007-7
Type :
conf
DOI :
10.1109/ICCP.2009.5284753
Filename :
5284753
Link To Document :
بازگشت