Typed MSR: Syntax and Examples
نویسنده
چکیده
Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security — MMM’01 (V. Gorodetski, V. Skormin and L. Popyack, editors), pp.??–??, c Springer-Verlag LNCS ???, St. Petersburg, Russia, 21–23 May 2001 cols can be traced to inadequate specification languages for message components, environment assumptions, and goals. In this paper, we present MSR, a strongly typed specification language for security protocols, which is intended to address the first two issues. Its typing infrastructure, based on the theory of dependent types with subsorting, yields elegant and precise formalizations, and supports a useful array of static check that include type-checking and access control validation. It uses multiset rewriting rules to express the actions of the protocol. The availability of memory predicates enable it to faithfully encode systems consisting of a collection of coordinated subprotocols, and constraints allow tackling objects belonging to complex interpretation domains, e.g. time stamps, in an abstract and modular way. We apply MSR to the specification of several examples.
منابع مشابه
Phantom Types
Phantom types are data types with type constraints associated with different cases. Examples of phantom types include typed type representations and typed higher-order abstract syntax trees. These types can be used to support typed generic functions, dynamic typing, and staged compilation in higher-order, statically typed languages such as Haskell or Standard ML. In our system, type constraints...
متن کاملA Broad-Typed Multi-Sensing-Range Method for Indoor Position Estimation of Passive RFID Tags
The RFID (Radio Frequency IDentification) system is paid attention as a technology that can realize a ubiquitous environment. Each RFID tag has a unique ID code, and is attached on some object with the information of the objects. A user reads the unique ID code using RFID readers and obtains the information of the object. One of the important applications of RFID technology is the indoor positi...
متن کاملTyped Multiset Rewriting Specifications of Security Protocols
The language MSR has successfully been used in the past to prove undecidability results about security protocols modeled according to the Dolev-Yao abstraction. In this paper, we revise this formalism into a flexible specification framework for complex crypto-protocols. More specifically, we equip it with an extensible typing infrastructure based on dependent types with subsorting, which elegan...
متن کاملFirst-Class Phantom Types
Classical phantom types are datatypes in which type constraints are expressed using type variables that do not appear in the datatype cases themselves. They can be used to embed typed languages into Haskell or ML. However, while such encodings guarantee that only wellformed data can be constructed, they do not permit type-safe deconstruction without additional tagging and run-time checks. We in...
متن کاملRemarks on Agreement and Incorporation Phenomena
In previous work (see Anderson 1992 and references cited there), I have developed a particular approach to the issue of “Lexicalism” in syntax. I have argued for a view of the relation between morphology and syntax on which a specific kind of feature complex (the Morphosyntactic Representation, or “MSR” of a form) constitutes the only interface between morphological and syntactic structure. The...
متن کامل