DocumentCode
437535
Title
Proving secure properties of cryptographic protocols with knowledge based approach
Author
Cheng, Xiaochun ; Ma, Xiaoqi ; Cheng, Maggie ; Huang, Scott C H
Author_Institution
Dept. of Comput. Sci., Reading Univ., UK
fYear
2005
fDate
7-9 April 2005
Firstpage
3
Lastpage
9
Abstract
Cryptographic protocols have been widely used to protect communications over insecure network environments. Existing cryptographic protocols usually contain flaws. To analyze these protocols and find potential flaws in them, the secure properties of them need be studied in depth. This paper attempts to provide a new framework to analyze and prove the secure properties in these protocols. A number of predicates and action functions are used to model the network communication environment. Domain rules are given to describe the transitions of principals´ knowledge and belief states. An example of public key authentication protocols has been studied and analysed.
Keywords
cryptography; inference mechanisms; protocols; telecommunication security; cryptographic protocol; knowledge based approach; network communication environment; secure property; Authentication; Communication system traffic control; Computer science; Cryptographic protocols; Logic; Protection; Public key; Public key cryptography; Security; State-space methods;
fLanguage
English
Publisher
ieee
Conference_Titel
Performance, Computing, and Communications Conference, 2005. IPCCC 2005. 24th IEEE International
ISSN
1097-2641
Print_ISBN
0-7803-8991-3
Type
conf
DOI
10.1109/PCCC.2005.1460503
Filename
1460503
Link To Document