DocumentCode
626268
Title
From Qualitative to Quantitative Proofs of Security Properties Using First-Order Conditional Logic
Author
Halpern, J.Y.
Author_Institution
Dept. of Comput. Sci., Cornell Univ., Ithaca, NY, USA
fYear
2013
fDate
25-28 June 2013
Firstpage
2
Lastpage
3
Abstract
Security protocols, such as key-exchange and key management protocols, are short, but notoriously difficult to prove correct. Flaws have been found in numerous protocols, ranging from the the 802.11 Wired Equivalent Privacy (WEP) protocol used to protect link-layer communications from eavesdropping and other attacks to standards and proposed standards for Secure Socket Layer to Kerberos. Not surprisingly, a great deal of effort has been devoted to proving the correctness of such protocols. There are two largely disjoint approaches. The first essentially ignores the details of cryptography by assuming perfect cryptography and an adversary that controls the network. The second approach applies the tools of modern cryptography to proving correctness, using more quantitative arguments.
Keywords
cryptographic protocols; formal logic; 802.11 wired equivalent privacy protocol; Kerberos; WEP protocol; eavesdropping; first-order conditional logic; key management protocol; key-exchange protocol; link-layer communications; perfect cryptography; qualitative proof; quantitative arguments; quantitative proof; secure socket layer; security property; security protocols; Cognition; Computer science; Cryptography; Polynomials; Protocols; Semantics;
fLanguage
English
Publisher
ieee
Conference_Titel
Logic in Computer Science (LICS), 2013 28th Annual IEEE/ACM Symposium on
Conference_Location
New Orleans, LA
ISSN
1043-6871
Print_ISBN
978-1-4799-0413-6
Type
conf
DOI
10.1109/LICS.2013.66
Filename
6571529
Link To Document