The ρ-spi Calculus at Work: Authentication Case Studies
نویسندگان
چکیده
In [10], we introduce a process calculus for describing security protocols and we propose a static and compositional analysis of entity authentication. In this paper we apply such a technique on well-known shared key authentication protocols. The analysis helps clarifying the protocol logics, suggests simplifications and reveals some attacks. Moreover we discuss how our analysis scales up to multi-protocol systems.
منابع مشابه
A Calculus for Cryptographic Protocols
We introduce the spi calculus, an extension of the pi calculus designed for describing and analyzing cryptographic protocols. We show how to use the spi calculus, particularly for studying authentication protocols. The pi calculus (without extension) suffices for some abstract protocols; the spi calculus enables us to consider cryptographic issues in more detail. We represent protocols as proce...
متن کاملA Calculus for Cryptographic Protocols the Spi Calculus 1 Security and the Pi Calculus
We introduce the spi calculus, an extension of the pi calculus designed for the description and analysis of cryptographic protocols. We show how to use the spi calculus, particularly for studying authentication protocols. The pi calculus (without extension) su ces for some abstract protocols; the spi calculus enables us to consider cryptographic issues in more detail. We represent protocols as ...
متن کاملePassport Protocol on the Spi Calculus
Electronic passport promises the possibility of a secure, simple and quick travel formalities. Many countries have started delivering electronic documents to their citizens. This is a proof of the importance of ePassport protocols which aim to improve the document security and the traveller authentication. Three generations of security solutions in ePassports were speci ed. We model via this wo...
متن کاملReasoning about Cryptographic Protocols in the Spi Calculus
The spi calculus is an extension of the pi calculus with constructs for encryption and decryption. This paper develops the theory of the spi calculus, focusing on techniques for establishing testing equivalence , and applying these techniques to the proof of authenticity and secrecy properties of cryptographic protocols. The idea of controlling communication by capabilities underlies both the p...
متن کاملPrimitives for authentication in process algebras
We extend the -calculus and the spi-calculus with two primitives that guarantee authentication. They enable us to abstract from various implementations/specifications of authentication, and to obtain idealized protocols which are “secure by construction”. The main underlying idea, originally proposed in [14] for entity authentication, is to use the locations of processes in order to check who i...
متن کامل