DocumentCode :
3382523
Title :
Temporal rank functions for forward secrecy
Author :
Delicata, Rob ; Schneider, Steve
Author_Institution :
Dept. of Comput., Surrey Univ., UK
fYear :
2005
fDate :
20-22 June 2005
Firstpage :
126
Lastpage :
139
Abstract :
A number of key establishment protocols claim the property of forward secrecy, where the compromise of a long-term key does not result in the compromise of previously computed session-keys. We describe how such protocols can be modelled using the process algebra CSP and explain why the well-known rank function approach is incapable of proving their correctness. This shortcoming motivates us to propose a generalised proof technique based on the novel concept of a temporal rank function. We apply this approach to two examples: a protocol due to Boyd and the Cliques (A-GDH.2) group key agreement protocol.
Keywords :
communicating sequential processes; data privacy; protocols; public key cryptography; Cliques group key agreement protocol; communicating sequential process; forward secrecy; key establishment protocols; process algebra; temporal rank functions; Algebra; Authentication; Computer security; Conferences; Cryptographic protocols; Cryptography; Delay; Formal verification; Protection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Foundations, 2005. CSFW-18 2005. 18th IEEE Workshop
ISSN :
1063-6900
Print_ISBN :
0-7695-2340-4
Type :
conf
DOI :
10.1109/CSFW.2005.26
Filename :
1443202
Link To Document :
بازگشت