Verifying Second-Level Security Protocols

نویسندگان

  • Giampaolo Bella
  • Cristiano Longo
  • Lawrence C. Paulson
چکیده

A second-level security protocol is defined as a security protocol that relies on an underlying security protocol in order to achieve its goals. The verification of classical authentication protocols has become routine, but second-level protocols raise new challenges. These include the formalisation of appeals to the underlying protocols, the modification of the threat model, and the formalisation of the novel goals. These challenges have been met using Isabelle and the Inductive Approach [14]. The outcomes are demonstrated on a recent protocol for certified e-mail delivery by Abadi et al. [2].

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Rule-based Programs Describing Internet Security Protocols

We present a low-level specification language used for describing real Internet security protocols. Specifications are automatically generated by a compiler, from TLA-based high-level descriptions of the protocols. The results are rule-based programs containing all the information needed for either implementing the protocols, or verifying some security properties. This approach has already been...

متن کامل

Verifying Security Protocols with Timestamps via Translation to Timed Automata

In this paper we show a general method of proving authentication and integrity of time dependent security protocols by applying powerful model checking tools originally developed for verifying properties of timed automata. Our approach consists in specifying a security protocol, possibly with timestamps, in a higher-level language and translating automatically the specification to a timed autom...

متن کامل

Verifying Data Integrity in Peer-to-Peer Media Streaming

We study data integrity verification in peer-to-peer media streaming for content distribution. Challenges include the timing constraint of streaming as well as the untrustworthiness of peers. We show the inadequacy of existing data integrity verification protocols, and propose Block-Oriented Probabilistic Verification (BOPV), an efficient protocol utilizing message digest and probabilistic veri...

متن کامل

Verifying Data Integrity in Peer-to-Peer Video Streaming

In this paper, we study the verification of data integrity during peer-to-peer video streaming sessions. Challenges include the timing constraint of streaming, as well as the untrustworthiness of peers. We show the inadequacy of existing authentication protocols and propose a more efficient protocol which utilizes message digest and probabilistic verification. We then propose One Time Digest Pr...

متن کامل

Automated Formulation of Security Goals under the Inductive Approach∗

The inductive approach [1] has been successfully used for verifying a number of security protocols, uncovering hidden assumptions and even attacks. Yet it requires a high level of skill to use: a user must guide the proof process, selecting the tactic to be applied, inventing a key lemma, etc. Proofs are both onerous and cumbersome. To compound the problem, security guarantees are not built int...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003