• DocumentCode
    626268
  • Title

    From Qualitative to Quantitative Proofs of Security Properties Using First-Order Conditional Logic

  • Author

    Halpern, J.Y.

  • Author_Institution
    Dept. of Comput. Sci., Cornell Univ., Ithaca, NY, USA
  • fYear
    2013
  • fDate
    25-28 June 2013
  • Firstpage
    2
  • Lastpage
    3
  • Abstract
    Security protocols, such as key-exchange and key management protocols, are short, but notoriously difficult to prove correct. Flaws have been found in numerous protocols, ranging from the the 802.11 Wired Equivalent Privacy (WEP) protocol used to protect link-layer communications from eavesdropping and other attacks to standards and proposed standards for Secure Socket Layer to Kerberos. Not surprisingly, a great deal of effort has been devoted to proving the correctness of such protocols. There are two largely disjoint approaches. The first essentially ignores the details of cryptography by assuming perfect cryptography and an adversary that controls the network. The second approach applies the tools of modern cryptography to proving correctness, using more quantitative arguments.
  • Keywords
    cryptographic protocols; formal logic; 802.11 wired equivalent privacy protocol; Kerberos; WEP protocol; eavesdropping; first-order conditional logic; key management protocol; key-exchange protocol; link-layer communications; perfect cryptography; qualitative proof; quantitative arguments; quantitative proof; secure socket layer; security property; security protocols; Cognition; Computer science; Cryptography; Polynomials; Protocols; Semantics;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Logic in Computer Science (LICS), 2013 28th Annual IEEE/ACM Symposium on
  • Conference_Location
    New Orleans, LA
  • ISSN
    1043-6871
  • Print_ISBN
    978-1-4799-0413-6
  • Type

    conf

  • DOI
    10.1109/LICS.2013.66
  • Filename
    6571529