Title :
Safe simplifying transformations for security protocols or not just the Needham Schroeder pubic key protocol
Author :
Hui, Mei Lin ; Lowe, Gavin
Author_Institution :
Dept. of Math. & Comput. Sci., Leicester Univ., UK
Abstract :
Recent techniques for analyzing security protocols have tended to concentrate upon the small protocols that are typically found in the academic literature. However there is a huge gulf between these and most large commercial protocols: the latter typically have many more fields, and much higher levels of nested encryption. As a result, existing techniques are difficult to apply directly to these large protocols. In this paper we develop the notion of safe simplifying transformations: transformations that have the property of preserving insecurities; the effect of such transformations is that if we can verify the transformed protocol, then we will have verified the original protocol. We identify a number of such safe simplifying transformations, and use them in the analysis of a commercial protocol
Keywords :
computational complexity; protocols; public key cryptography; Needham Schroeder pubic key protocol; nested encryption; safe simplifying transformations; security protocols; Computer science; Computer security; Cryptographic protocols; Cryptography; Electrical capacitance tomography; Electronic mail; Mathematics; Public key; State-space methods; Tellurium;
Conference_Titel :
Computer Security Foundations Workshop, 1999. Proceedings of the 12th IEEE
Conference_Location :
Mordano
Print_ISBN :
0-7695-0201-6
DOI :
10.1109/CSFW.1999.779760