Vertical Protocol Composition ( Extended Version )
نویسندگان
چکیده
The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol composition, and it is truly commonplace in today’s communication with the diversity of VPNs and secure browser sessions. In fact, it is normal that we have several layers of secure channels: For instance, on top of a VPN-connection, a browser may establish another secure channel (possibly with a different end point). Even using the same protocol several times in such a stack of channels is not unusual: An application may very well establish another TLS channel over an established one. We call this selfcomposition. In fact, there is nothing that tells us that all these compositions are sound, i.e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application protocols that fulfills a number of sufficient preconditions. These preconditions are satisfied for many practically relevant protocols such as TLS.
منابع مشابه
Sufficient Conditions for Vertical Composition of Security Protocols * (extended Version)
Vertical composition of security protocols means that an ap-plication protocol (e.g., a banking service) runs over a chan-nel established by another protocol (e.g., a secure channel provided by TLS). This naturally gives rise to a compositionality question: given a secure protocol P1 that providesa certain kind of channel as a goal and another secure proto-col P2 that assumes th...
متن کاملSolving Parallel Equations with BALM-II
In this report we describe how to solve parallel language equations over regular languages / automata and finite state machines (FSMs), using the software package BALM-II, which is an extended version of BALM. The original BALMwas able to solve equations only with respect to synchronous composition; we extended it to solve also equations with respect to parallel composition, adding new commands...
متن کاملOn the Security of O-PSI a Delegated Private Set Intersection on Outsourced Datasets (Extended Version)
In recent years, determining the common information privately and efficiently between two mutually mistrusting parties have become an important issue in social networks. Many Private set intersection (PSI) protocols have been introduced to address this issue. By applying these protocols, two parties can compute the intersection between their sets without disclosing any information about compone...
متن کاملEffects of Backward Gait Training on Ground Reaction Forces in Patients with Medial Knee Osteoarthritis
introduction: The aim of this study was to investigate the effects of backward gait training protocol on ground reaction forces in Patients with medial knee Osteoarthritis. Methods: This quasi-experimental study was performed with a pretest-posttest design in two groups of healthy and unhealthy and the experimental group (participants with medial knee osteoarthritis). The participants were 21 ...
متن کاملHorizontal Service Composition for Language Services
In the Language Grid, automatically composing Web services is a crucial task. This task involves vertical and horizontal composition. Vertical composition consists of defining an appropriate combination of simple processes to perform a composition task. Horizontal composition consists of determining the most appropriate Web service from among a set of functionally equivalent ones for each compo...
متن کامل