We explore the applicability of the programming method of Feijen and van Gasteren to the domain of security protocols. This method addresses the derivation of concurrent programs from a formal specification, and it is based on common notions like invariants and pre- and post-conditions. We show that fundamental security concepts like secrecy and authentication can nicely be specified in this way. Using some small extensions, the style of formal reasoning from this method can be applied to the security domain. To demonstrate our approach, we discuss an authentication protocol and a public-key distribution protocol, and we deal with their composition. By focussing on a general setting where agents run the protocols multiple times, the nonce concept turns out to pop-up naturally. Although this work does not contain any new protocols, it does offer a new view on reasoning about security protocols.
CITATION STYLE
Mooij, A. J. (2010). Invariant-based reasoning about parameterized security protocols. In Formal Aspects of Computing (Vol. 22, pp. 63–81). https://doi.org/10.1007/s00165-009-0104-0
Mendeley helps you to discover research relevant for your work.