Sufficient Conditions for Vertical Composition of Security Protocols * (extended Version)

نویسندگان

  • Sebastian Mödersheim
  • Luca Viganò
چکیده

Vertical composition of security protocols means that an ap-plication protocol (e.g., a banking service) runs over a chan-nel established by another protocol (e.g., a secure channel provided by TLS). This naturally gives rise to a compositionality question: given a secure protocol P1 that providesa certain kind of channel as a goal and another secure proto-col P2 that assumes this kind of channel, can we then derivethat their vertical composition P2[P1] is secure? It is wellknown that protocol composition can lead to attacks evenwhen the individual protocols are all secure in isolation. Inthis paper, we formalize seven easy-to-check static condi-tions that support a large class of channels and applications and that we prove to be sufficient for vertical security pro-

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Vertical Protocol Composition ( Extended Version )

The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol composition, and it is truly commonplace in today’s communication with the diversity of VPNs and secure...

متن کامل

On the Security of O-PSI a Delegated Private Set Intersection on Outsourced Datasets (Extended Version)

In recent years, determining the common information privately and efficiently between two mutually mistrusting parties have become an important issue in social networks. Many Private set intersection (PSI) protocols have been introduced to address this issue. By applying these protocols, two parties can compute the intersection between their sets without disclosing any information about compone...

متن کامل

Weighted Composition Operators Between Extended Lipschitz Algebras on Compact Metric Spaces

‎In this paper, we provide a complete description of weighted composition operators between extended Lipschitz algebras on compact metric spaces. We give necessary and sufficient conditions for the injectivity and the sujectivity of these operators. We also obtain some sufficient conditions and some necessary conditions for a weighted composition operator between these spaces to be compact.

متن کامل

A note on the security of two improved RFID protocols

Recently, Baghery et al. [1, 2] presented some attacks on two RFID protocols, namely Yoon and Jung et al. protocols, and proposed the improved version of them. However, in this note, we show that the improved version of the Jung et al. protocol suffers from desynchronization attack and the improved version of the Yoon's protocol suffers from secret disclosure attack. The succe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014