Title :
Analyzing NSPK with the Applied Pi Calculus
Author :
Cai, Xiaojuan ; Wu, Xiaohong
Author_Institution :
Dept. of Comput. Sci., Shanghai Jiao Tong Univ., Shanghai, China
Abstract :
We present a framework for describing and analyzing cryptography protocols based on the Applied Pi calculus. The Needham-Schroeder Publick Key protocol (NSPK for short) and its fixed version by Lowe are modeled in this framework. Authentication is analyzed with the bisimulation method. We get that NSPK is insecure even with only one corrupted party while the fixed version is secure as long as there are two honest parties.
Keywords :
bisimulation equivalence; cryptographic protocols; message authentication; pi calculus; public key cryptography; Needham-Schroeder publick key protocol; Pi calculus; authentication analysis; bisimulation method; cryptography protocol analysis; Authentication; Calculus; Communication system security; Computer science; Computer security; Cryptographic protocols; Cryptography; Educational institutions; Electronic commerce; Laboratories; authentication; bisimulation; observational equivalence; security protocols;
Conference_Titel :
Electronic Commerce and Security, 2009. ISECS '09. Second International Symposium on
Conference_Location :
Nanchang
Print_ISBN :
978-0-7695-3643-9
DOI :
10.1109/ISECS.2009.21