Cryptographic protocol composition via the authentication tests

28Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Although cryptographic protocols are typically analyzed in isolation, they are used in combinations. If a protocol Π 1, when analyzed alone, was shown to meet some security goals, will it still meet those goals when executed together with a second protocol Π 2? Not necessarily: for every Π 1, some Π 2s undermine its goals. We use the strand space "authentication test" principles to suggest a criterion to ensure a Π 2 preserves Π 1's goals; this criterion strengthens previous proposals. Security goals for Π 1 are expressed in a language (Π 1) in classical logic. Strand spaces provide the models for (Π 1). Certain homomorphisms among models for (Π) preserve the truth of the security goals. This gives a way to extract-from a counterexample to a goal that uses both protocols-a counterexample using only the first protocol. This model-theoretic technique, using homomorphisms among models to prove results about a syntactically defined set of formulas, appears to be novel for protocol analysis. © 2009 Springer Berlin Heidelberg.

References Powered by Scopus

On the Security of Public Key Protocols

4339Citations
N/AReaders
Get full text

Direct anonymous attestation

753Citations
N/AReaders
Get full text

Order-sorted algebra I: equational deduction for multiple inheritance, overloading, exceptions and partial operations

322Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Secure pseudonymous channels

45Citations
N/AReaders
Get full text

Protocol composition for arbitrary primitives

36Citations
N/AReaders
Get full text

The open-source fixed-point model checker for symbolic analysis of security protocols

34Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Guttman, J. D. (2009). Cryptographic protocol composition via the authentication tests. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5504 LNCS, pp. 303–317). https://doi.org/10.1007/978-3-642-00596-1_22

Readers over time

‘09‘12‘14‘16‘17‘18‘19‘20‘21‘2302468

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 15

65%

Researcher 4

17%

Professor / Associate Prof. 3

13%

Lecturer / Post doc 1

4%

Readers' Discipline

Tooltip

Computer Science 22

88%

Physics and Astronomy 1

4%

Mathematics 1

4%

Engineering 1

4%

Save time finding and organizing research with Mendeley

Sign up for free
0