Invariant-based reasoning about parameterized security protocols

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

We explore the applicability of the programming method of Feijen and van Gasteren to the domain of security protocols. This method addresses the derivation of concurrent programs from a formal specification, and it is based on common notions like invariants and pre- and post-conditions. We show that fundamental security concepts like secrecy and authentication can nicely be specified in this way. Using some small extensions, the style of formal reasoning from this method can be applied to the security domain. To demonstrate our approach, we discuss an authentication protocol and a public-key distribution protocol, and we deal with their composition. By focussing on a general setting where agents run the protocols multiple times, the nonce concept turns out to pop-up naturally. Although this work does not contain any new protocols, it does offer a new view on reasoning about security protocols.

Cite

CITATION STYLE

APA

Mooij, A. J. (2010). Invariant-based reasoning about parameterized security protocols. In Formal Aspects of Computing (Vol. 22, pp. 63–81). https://doi.org/10.1007/s00165-009-0104-0

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free