Title :
Refining Key Establishment
Author :
Sprenger, C. ; Basin, David
Author_Institution :
Inst. of Inf. Security, ETH Zurich, Zurich, Switzerland
Abstract :
We use refinement to systematically develop a family of key establishment protocols using a theorem prover. Our development spans four levels of abstraction: abstract security properties, message-less guard protocols, protocols communicating over channels with security properties, and protocols secure with respect to a Dolev-Yao intruder. The protocols we develop are Needham-Schroeder Shared Key, the core of Kerberos 4 and 5, and Denning Sacco, and include realistic features such as key confirmation, replay caches, and encrypted tickets. Our development highlights that message-less guard protocols provide a fundamental abstraction for bridging the gap between security properties and message-based protocol descriptions. It also shows that the refinement approach presented in [SB10] can be applied, with minor adaption, to families of key establishment protocols and that it scales to protocols of nontrivial size and complexity.
Keywords :
cryptographic protocols; data structures; telecommunication channels; Denning Sacco; Dolev-Yao intruder; Kerberos 4; Kerberos 5; Needham-Schroeder shared key; abstract security properties; abstraction levels; communicating channels; encrypted tickets; message-based protocol descriptions; message-less guard protocols; messageless guard protocols; minor adaption; nontrivial complexity; nontrivial size; refining key establishment protocol; theorem prover; Abstracts; Authentication; Authorization; Concrete; Cryptography; Protocols; key establishment; security protocols; stepwise refinement;
Conference_Titel :
Computer Security Foundations Symposium (CSF), 2012 IEEE 25th
Conference_Location :
Cambridge, MA
Print_ISBN :
978-1-4673-1918-8
Electronic_ISBN :
1940-1434
DOI :
10.1109/CSF.2012.21