DocumentCode :
2928000
Title :
Holistic analysis of mix protocols
Author :
Bella, Giampaolo ; Butin, Denis ; Gray, David
fYear :
2011
fDate :
5-8 Dec. 2011
Firstpage :
338
Lastpage :
343
Abstract :
Security protocols are often analysed in isolation as academic challenges. However, the real world can require various combinations of them, such as a certified email protocol executed over a resilient channel, or the key registration protocol to precede the purchase protocols of Secure Electronic Transactions (SET). We develop what appears to be the first scalable approach to specifying and analysing mix protocols. It expands on the Inductive Method by exploiting the simplicity with which inductive definitions can refer to each other. This lets the human analyst study each protocol separately first, and then derive holistic properties about the mix. The approach, which is demonstrated on the sequential composition of a certification protocol with an authentication one, is not limited by the features of the protocols, which can, for example, share message components such as cryptographic keys and nonces. It bears potential for the analysis of complex protocols constructed by general composition of others.
Keywords :
cryptographic protocols; authentication protocol; certification protocol; certified email protocol; holistic analysis; inductive method; key registration protocol; mix protocols; purchase protocols; resilient channel; secure electronic transactions; security protocols; Authentication; Encryption; Niobium; Protocols; Public key; Inductive Method; Isabelle; Security; Theorem Proving;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance and Security (IAS), 2011 7th International Conference on
Conference_Location :
Melaka
Print_ISBN :
978-1-4577-2154-0
Type :
conf
DOI :
10.1109/ISIAS.2011.6122843
Filename :
6122843
Link To Document :
بازگشت