• DocumentCode
    3058951
  • Title

    Analyzing NSPK with the Applied Pi Calculus

  • Author

    Cai, Xiaojuan ; Wu, Xiaohong

  • Author_Institution
    Dept. of Comput. Sci., Shanghai Jiao Tong Univ., Shanghai, China
  • Volume
    2
  • fYear
    2009
  • fDate
    22-24 May 2009
  • Firstpage
    386
  • Lastpage
    390
  • Abstract
    We present a framework for describing and analyzing cryptography protocols based on the Applied Pi calculus. The Needham-Schroeder Publick Key protocol (NSPK for short) and its fixed version by Lowe are modeled in this framework. Authentication is analyzed with the bisimulation method. We get that NSPK is insecure even with only one corrupted party while the fixed version is secure as long as there are two honest parties.
  • Keywords
    bisimulation equivalence; cryptographic protocols; message authentication; pi calculus; public key cryptography; Needham-Schroeder publick key protocol; Pi calculus; authentication analysis; bisimulation method; cryptography protocol analysis; Authentication; Calculus; Communication system security; Computer science; Computer security; Cryptographic protocols; Cryptography; Educational institutions; Electronic commerce; Laboratories; authentication; bisimulation; observational equivalence; security protocols;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Electronic Commerce and Security, 2009. ISECS '09. Second International Symposium on
  • Conference_Location
    Nanchang
  • Print_ISBN
    978-0-7695-3643-9
  • Type

    conf

  • DOI
    10.1109/ISECS.2009.21
  • Filename
    5209878