Security Protocols and Specifications
نویسنده
چکیده
Specifications for security protocols range from informal narrations of message flows to formal assertions of protocol properties. This paper (intended to accompany a lecture at ETAPS ’99) discusses those specifications and suggests some gaps and some opportunities for further work. Some of them pertain to the traditional core of the field; others appear when we examine the context in which protocols operate.
منابع مشابه
Security Protocols and their Properties
Specifications for security protocols range from informal narrations of message flows to formal assertions of protocol properties. This paper discusses those specifications, emphasizing authenticity and secrecy properties. It also suggests some gaps and some opportunities for further work. Some of them pertain to the traditional core of the field; others appear when we examine the context in wh...
متن کاملLayered Specifications Framework for Analysis of Secure Protocols
We present a framework for specification and analysis of layered distributed algorithms, especially cryptographic protocols, with emphasis on security and fault-tolerance. Layered specifications is standard engineering practice, e.g. in networking (the OSI and TCP/IP protocol stacks). Layered specifications allow modular design of each layer, proving layer i meets specifications speci assuming ...
متن کاملA Tool for Supporting Developers in Analyzing the Security of Web-Based Security Protocols
Security protocols are specified in natural language, are highlyconfigurable, and may not match the internal requirements of the development company. As a result, developers may misunderstand the specifications, may not grasp the security implications of configurations, and may deviate from the specifications introducing flaws. However, none of the existing techniques in discovering flaws provi...
متن کاملSimulation of Security Protocols based on Scenarios of Attacks
In this paper we offer a methodology allowing for simulation of security protocols, implemented in the higher-level language Estelle, using scenarios designed for external attacks. To this aim we apply a translation of specifications of security protocols from Common Syntax to Estelle and an encoding of schemes of attacks into Estelle scenarios. We show that such an intelligent simulation may e...
متن کاملOn the Specification of Secure Channels
Security architectures often make use of secure transport protocols to protect network messages: the transport protocols provide secure channels between hosts. In this paper we present a hierarchy of specifications for secure channels. We give trace specifications capturing a number of different confidentiality and authentication properties that secure channels might satisfy, and compare their ...
متن کامل