DocumentCode
2139407
Title
Handling infeasible specifications of cryptographic protocols
Author
Gong, Li
Author_Institution
ORA Corp., Ithaca, NY, USA
fYear
1991
fDate
18-20 Jun 1991
Firstpage
99
Lastpage
102
Abstract
In the verification of cryptographic protocols using the authentication logic of Burrows, Abadi, and Needham (1989) it is possible to write a specification which does not faithfully represent the real world situation. Such a specification, though impossible or unreasonable to implement, can go undetected and be verified to be correct. It can also lead to logical statements that do not preserve causality which in turn can have undesirable consequences. Such a specification, called an infeasible specification, can be subtle and hard to locate. The article shows how the logic of cryptographic protocols of Gong, Needham, and Yahalom (1990) can be enhanced with a notion of eligibility to preserve causality of beliefs and detect infeasible specifications. It is conceivable that this technique can be adopted in other similar logics
Keywords
cryptography; formal logic; formal specification; protocols; causality; cryptographic protocols; eligibility; infeasible specification; verification; Authentication; Body sensor networks; Computer science; Concrete; Cryptographic protocols; Cryptography; Encoding; Guidelines; Logic; Timing;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Security Foundations Workshop IV, 1991. Proceedings
Conference_Location
Franconia, NH
Print_ISBN
0-8186-2215-6
Type
conf
DOI
10.1109/CSFW.1991.151575
Filename
151575
Link To Document