Authentication Primitives for Refining Protocol Specifications
نویسندگان
چکیده
We propose a way to abstract from various specifications of authentication and to obtain idealized protocols “secure by construction”. This feature enables us to prove that a cryptographic protocol is the correct implementation of the corresponding abstract protocol. Our proposal relies on the combination of two authentication primitives, proposed by the authors in [20, 18] to a simplified version of the spi calculus. Introduction Authentication is one of the main issues in security and it can have different purposes depending on the specific application considered. For example, entity authentication is related to the verification of an entity’s claimed identity [1], whilemessage authentication should make it possible for the receiver of a message to ascertain its origin [2]. In recent years there have been some formalizations of these different aspects of authentication (see, e.g., [3, 4, 5, 6, 7, 8, 9, 16]). These formalizations are crucial for proofs of authentication properties, that sometimes have been automatized (see, e.g. [10, 11, 12, 13, 14]). This work has been partially supported by MURST Progetto TOSCA, Progetto AI, TS & CFA and Progetto “Metodi formali per la Sicurezza”.
منابع مشابه
Authentication Primitives for Refining Protocol Specifications Authentication Primitives for Refining Protocol Specifications *
We propose a way to abstract from various specifications of authentication and to obtain idealized protocols “secure by construction”. This feature enables us to prove that a cryptographic protocol is the correct implementation of the corresponding abstract protocol. Our proposal relies on the combination of two authentication primitives, proposed by the authors in [20, 18] to a simplified vers...
متن کاملProcess algebraic modeling of authentication protocols for analysis of parallel multi-session executions
Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...
متن کاملAuthentication primitives for secure protocol specifications
We use two authentication primitives proposed recently as a linguistic support for enforcing authentication. They offer a way of abstracting from various specifications of authentication and of obtaining idealized protocols “secure by construction”. Consequently, they help in proving that a cryptographic protocol correctly implements its corresponding abstract version; when the implementation i...
متن کاملAuthentication Primitives for Protocol Specifications
We advocate here the use of two authentication primitives we recently propose in a calculus for distributed systems, as a further instrument for programmers interested in authentication. These primitives offer a way of abstracting from various specifications of authentication and obtaining idealized protocols “secure by construction”. We can consequently prove that a cryptographic protocol is t...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کامل