Title :
Temporal rank functions for forward secrecy
Author :
Delicata, Rob ; Schneider, Steve
Author_Institution :
Dept. of Comput., Surrey Univ., UK
Abstract :
A number of key establishment protocols claim the property of forward secrecy, where the compromise of a long-term key does not result in the compromise of previously computed session-keys. We describe how such protocols can be modelled using the process algebra CSP and explain why the well-known rank function approach is incapable of proving their correctness. This shortcoming motivates us to propose a generalised proof technique based on the novel concept of a temporal rank function. We apply this approach to two examples: a protocol due to Boyd and the Cliques (A-GDH.2) group key agreement protocol.
Keywords :
communicating sequential processes; data privacy; protocols; public key cryptography; Cliques group key agreement protocol; communicating sequential process; forward secrecy; key establishment protocols; process algebra; temporal rank functions; Algebra; Authentication; Computer security; Conferences; Cryptographic protocols; Cryptography; Delay; Formal verification; Protection;
Conference_Titel :
Computer Security Foundations, 2005. CSFW-18 2005. 18th IEEE Workshop
Print_ISBN :
0-7695-2340-4
DOI :
10.1109/CSFW.2005.26