Multi-Dimensional Security Protocol Engineering using SPEAR
نویسندگان
چکیده
Multi-dimensional security analysis is effective in creating cryptographic protocols since it encompasses a variety of analysis techniques, thereby providing a higher security confidence than individual approaches. SPEAR, the Security Protocol Engineering and Analysis Resource, is a protocol engineering tool which focuses on security protocols, with the specific aim of producing secure and efficient protocol designs and support for the ‘production’ process. SPEAR offers developers of cryptographic protocols an environment in which to design, analyse and generate security protocols. In order to provide multidimensional support, SPEAR enables protocol specification via a graphical user interface in the style of message sequence charts (MSC’s); security analysis based on cryptographic logics (currently BAN [4]) and code generation (currently Java). Following design analysis, meta-execution of code, which allows performance evaluation, can be performed. The fusion of these approaches allows the user to create cryptographic protocols from within the controlled environment of SPEAR.
منابع مشابه
SPEAR II The Security Protocol Engineering and Analysis Resource
Multi-dimensional security protocol engineering is effective in creating cryptographic protocols since it encompasses a variety of analysis techniques, thereby providing a higher security confidence than individual approaches. SPEAR, the Security Protocol Engineering and Analysis Resource, was a protocol engineering tool which focused on cryptographic protocols, with the specific aims of enabli...
متن کاملAutomated Attack Analysis and Code Generation in a Multi-Dimensional Security Protocol Engineering Framework
A unified, multi-dimensional approach to security protocol engineering is effective for creating cryptographic protocols since it encompasses a variety of design, analysis and implementation techniques, thereby providing a higher level of confidence than individual approaches. SPEAR II, the Security Protocol Engineering and Analysis Resource II is a tool which supports this unified, multi-dimen...
متن کاملUsing Gypsie, Gynger and Visual GNY to Analyse Cryptographic Protocols in SPEAR II
The development of cryptographic logics to analyze security protocols has provided one technique for ensuring the correctness of these protocols. However, it is commonly acknowledged that analysis using a modal logic such as GNY tends to be inaccessible and obscure for the uninitiated. In this paper we describe the SPEAR II graphically-based security protocol engineering environment that can be...
متن کاملFacilitating the Modelling and Automated Analysis of Cryptographic Protocols
Multi-dimensional security protocol engineering is effective for creating cryptographic protocols since it encompasses a variety of design, analysis and deployment techniques, thereby providing a higher level of confidence than individual approaches. SPEAR II, the Security Protocol Engineering and Analysis Resource II, is a protocol engineering tool built on the foundation of previous experienc...
متن کاملAttack analysis of cryptographic protocols using strand spaces
Network security protocols make use of cryptographic techniques to achieve goals such as confidentiality, authentication, integrity and non-repudiation. However, the fact that strong cryptographic algorithms exist does not guarantee the security of a communications system. In fact, it is recognised that the engineering of security protocols is a very challenging task, since protocols that appea...
متن کامل