Observational equivalence and trace equivalence in an extension of Spi − calculus . Application to cryptographic protocols analysis Research Report LSV − 02 − 3 , Mar . 2002 Ecole Normale
نویسنده
چکیده
منابع مشابه
Véronique Cortier and Stéphanie Delaune A method for proving observational equivalence Research Report LSV - 09 - 04 February 2009
Formal methods have proved their usefulness for an-alyzing the security of protocols. Most existing resultsfocus on trace properties like secrecy or authentication.There are however several security properties, whichcannot be defined (or cannot be naturally defined) astrace properties and require the notion of observationalequivalence. Typical examples are anonymity, pri...
متن کاملEquivalEncEs and calculi for formal vErification of cryptographic protocols
Security protocols are essential to the proper functioning of any distributed system running over an insecure network but often have flaws that can be exploited even without breaking the cryptography. Formal cryptography, the assumption that the cryptographic primitives are flawless, facilitates the construction of formal models and verification tools. Such models are often based on process cal...
متن کاملA Calculus for Cryptographic Protocols
We introduce the spi calculus, an extension of the pi calculus designed for describing and analyzing cryptographic protocols. We show how to use the spi calculus, particularly for studying authentication protocols. The pi calculus (without extension) suffices for some abstract protocols; the spi calculus enables us to consider cryptographic issues in more detail. We represent protocols as proce...
متن کاملSymbolic Bisimulation in the Spi Calculus
The spi calculus is an executable model for the description and analysis of cryptographic protocols. Security objectives like secrecy and authenticity can be formulated as equations between spi calculus terms, where equality is interpreted as a contextual equivalence. One problem with verifying contextual equivalences for message-passing process calculi is the infinite branching on process inpu...
متن کاملRohit Chadha , Stéphanie Delaune and Steve Kremer Epistemic Logic for the Applied Pi Calculus Research Report LSV - 09 - 06 March 2009
We propose an epistemic logic for the applied pi calculus, which is a variant of the pi calculus with extensions for modeling cryptographic protocols. In such a calculus, the security guarantees are usually stated as observational equivalence. While process calculi provide a natural means to describe the protocols themselves, epistemic logics are often better suited for expressing certain secur...
متن کامل