Formalizing and Analyzing Sender Invariance
نویسندگان
چکیده
In many network applications and services, agents that share no secure channel in advance may still wish to communicate securely with each other. In such settings, one often settles for achieving security goals weaker than authentication, such as sender invariance. Informally, sender invariance means that all messages that seem to come from the same source actually do, where the source can perhaps only be identified by a pseudonym. This implies, in particular, that the relevant parts of messages cannot be modified by an intruder. In this paper, we provide the first formal definition of sender invariance as well as a stronger security goal that we call strong sender invariance. We show that both kinds of sender invariance are closely related to, and entailed by, weak authentication, the primary difference being that sender invariance is designed for the context where agents can only be identified pseudonymously. In addition to clarifying how sender invariance and authentication are related, this result shows how a broad class of automated tools can be used for the analysis of sender invariance protocols. As a case study, we describe the analysis of two sender invariance protocols using the OFMC back-end of the AVISPA Tool.
منابع مشابه
Investigation of isomorph-invariance in liquid methane by molecular dynamics simulation
In this paper, isomorph invariance of liquid methane is investigated by means of constant-NVT molecular dynamics simulations. According to the data extracted from simulations, equilibrium fluctuations show strong correlation between potential energy U and virial W. We also generated isomorph state points and investigated invariance of certain thermodynamic, structural, and dynamical properties....
متن کاملOn Performance Modeling for HPF Applications with ASL
Multiprocessor systems are increasingly being used to handle large-scale scientific applications that demand high-performance. However, performance analysis is not as mature for multiprocessor systems as for uniprocessor systems, and improved ways of automatic performance analysis are needed to reduce the cost and complexity of developing distributed/parallel applications. Performance analysis ...
متن کاملAutomatic Generation of Invariants and Intermediate Assertions
Verifying temporal specifications of reactive and concurrent systems commonly relies on generating auxiliary assertions and on strengthening given properties of the system. This can be achieved by two dual approaches: The hottom-up method performs an abstract forward propagation (computation) of the system, generating auxiliary assertions; the top-down method performs an abstract backward propa...
متن کاملFormalizing Goals and Objectives in Iranian Educational System: A Historical Analysis
Formalizing goals and objectives within any organization is influenced by many socio-historical factors. To identify the trend in which educational goals and objectives within the Iranian educational system have evolved in terms of the approach, pattern, performance, and attending to individual differences, a historical analysis was undertaken. Findings are indicative of four eras: first, the c...
متن کاملInvariance of Fréchet frames under perturbation
Motivating the perturbations of frames in Hilbert and Banach spaces, in this paper we introduce the invariance of Fr'echet frames under perturbation. Also we show that for any Fr'echet spaces, there is a Fr'echet frame and any element in these spaces has a series expansion.
متن کامل