DocumentCode
3058951
Title
Analyzing NSPK with the Applied Pi Calculus
Author
Cai, Xiaojuan ; Wu, Xiaohong
Author_Institution
Dept. of Comput. Sci., Shanghai Jiao Tong Univ., Shanghai, China
Volume
2
fYear
2009
fDate
22-24 May 2009
Firstpage
386
Lastpage
390
Abstract
We present a framework for describing and analyzing cryptography protocols based on the Applied Pi calculus. The Needham-Schroeder Publick Key protocol (NSPK for short) and its fixed version by Lowe are modeled in this framework. Authentication is analyzed with the bisimulation method. We get that NSPK is insecure even with only one corrupted party while the fixed version is secure as long as there are two honest parties.
Keywords
bisimulation equivalence; cryptographic protocols; message authentication; pi calculus; public key cryptography; Needham-Schroeder publick key protocol; Pi calculus; authentication analysis; bisimulation method; cryptography protocol analysis; Authentication; Calculus; Communication system security; Computer science; Computer security; Cryptographic protocols; Cryptography; Educational institutions; Electronic commerce; Laboratories; authentication; bisimulation; observational equivalence; security protocols;
fLanguage
English
Publisher
ieee
Conference_Titel
Electronic Commerce and Security, 2009. ISECS '09. Second International Symposium on
Conference_Location
Nanchang
Print_ISBN
978-0-7695-3643-9
Type
conf
DOI
10.1109/ISECS.2009.21
Filename
5209878
Link To Document