Véronique Cortier and Stéphanie Delaune Safely composing security protocols Research Report LSV - 08 - 06 March 2008
نویسندگان
چکیده
Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol in the presence of an active attacker that may block, intercept and send new messages. However even when a protocol has been proved secure, there is absolutely no guarantee if the protocol is executed in an environment where other protocols are executed, possibly sharing some common identities and keys like public keys or long-term symmetric keys. In this paper, we show that security of protocols can be easily composed. More precisely, we show that whenever a protocol is secure, it remains secure even in an environment where arbitrary protocols satisfying a reasonable (syntactic) condition are executed. This result holds for a large class of security properties that encompasses secrecy and various formulations of authentication.
منابع مشابه
Véronique Cortier and Stéphanie Delaune A method for proving observational equivalence Research Report LSV - 09 - 04 February 2009
Formal methods have proved their usefulness for an-alyzing the security of protocols. Most existing resultsfocus on trace properties like secrecy or authentication.There are however several security properties, whichcannot be defined (or cannot be naturally defined) astrace properties and require the notion of observationalequivalence. Typical examples are anonymity, pri...
متن کاملSafely Composing Security Protocols
Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol. However even when a protocol has been proved secure, there is absolutely no guarantee if the protocol is executed in an environment where other protocols, possibly sharing some common identities and keys like public keys or l...
متن کاملMathilde Arnaud , Véronique Cortier , and Stéphanie Delaune Modeling and Verifying Ad Hoc Routing Protocols Research Report LSV - 10 - 03 February 2010
Mobile ad hoc networks consist of mobile wireless de-vices which autonomously organize their infrastructure.In such networks, a central issue, ensured by routingprotocols, is to find a route from one device to another.Those protocols use cryptographic mechanisms in or-der to prevent malicious nodes from compromising thediscovered route.Our contribution is twofold. We...
متن کاملRohit Chadha , Stéphanie Delaune and Steve Kremer Epistemic Logic for the Applied Pi Calculus Research Report LSV - 09 - 06 March 2009
We propose an epistemic logic for the applied pi calculus, which is a variant of the pi calculus with extensions for modeling cryptographic protocols. In such a calculus, the security guarantees are usually stated as observational equivalence. While process calculi provide a natural means to describe the protocols themselves, epistemic logics are often better suited for expressing certain secur...
متن کاملŞtefan Ciobâcă , Stéphanie Delaune , and Steve Kremer Computing knowledge in security protocols under convergent equational theories Research Report LSV - 09 - 05 March , 2009
The analysis of security protocols requires reasoning about the knowledge an attacker acquires by eavesdropping on network traffic. In formal approaches, the messages exchanged over the network are modeled by a term algebra equipped with an equational theory axiomatizing the properties of the cryptographic primitives (e.g. encryption, signature). In this context, two classical notions of knowle...
متن کامل