• DocumentCode
    2139407
  • Title

    Handling infeasible specifications of cryptographic protocols

  • Author

    Gong, Li

  • Author_Institution
    ORA Corp., Ithaca, NY, USA
  • fYear
    1991
  • fDate
    18-20 Jun 1991
  • Firstpage
    99
  • Lastpage
    102
  • Abstract
    In the verification of cryptographic protocols using the authentication logic of Burrows, Abadi, and Needham (1989) it is possible to write a specification which does not faithfully represent the real world situation. Such a specification, though impossible or unreasonable to implement, can go undetected and be verified to be correct. It can also lead to logical statements that do not preserve causality which in turn can have undesirable consequences. Such a specification, called an infeasible specification, can be subtle and hard to locate. The article shows how the logic of cryptographic protocols of Gong, Needham, and Yahalom (1990) can be enhanced with a notion of eligibility to preserve causality of beliefs and detect infeasible specifications. It is conceivable that this technique can be adopted in other similar logics
  • Keywords
    cryptography; formal logic; formal specification; protocols; causality; cryptographic protocols; eligibility; infeasible specification; verification; Authentication; Body sensor networks; Computer science; Concrete; Cryptographic protocols; Cryptography; Encoding; Guidelines; Logic; Timing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Security Foundations Workshop IV, 1991. Proceedings
  • Conference_Location
    Franconia, NH
  • Print_ISBN
    0-8186-2215-6
  • Type

    conf

  • DOI
    10.1109/CSFW.1991.151575
  • Filename
    151575