New semantic model for authentication protocols in ASMs

被引:5
作者
Xue, R [1 ]
Feng, DG [1 ]
机构
[1] Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China
基金
中国国家自然科学基金;
关键词
cryptographic protocol; formal analysis; abstract state machine (ASM); authentication protocol;
D O I
10.1007/BF02944758
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A new semantic model in Abstract State Model (ASM) for authentication protocols is presented. It highlights the Woo-Lam's ideas for authentication, which is the strongest one in Lowe's definition hierarchy for entity authentication. Apart from the flexible and natural features in forming and analyzing protocols inherited from ASM, the model defines both authentication and secrecy properties explicitly in first order sentences as invariants. The process of proving security properties with respect to an authentication protocol blends the correctness and secrecy properties together to avoid the potential flaws which may happen when treated separately. The security of revised Helsinki protocol is shown as a case study. The new model is different from the previous ones in ASMs.
引用
收藏
页码:555 / 563
页数:9
相关论文
共 22 条
[1]  
Bella G., 1997, J UNIVERS COMPUT SCI, V3, P1337
[2]  
Bella G., 1998, WORKSHOP ABSTRACT ST, P127
[3]  
Börger E, 1999, LECT NOTES COMPUT SC, V1641, P1
[4]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[5]   Universally composable security: A new paradigm for cryptographic protocols [J].
Canetti, R .
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, :136-145
[6]   Security and composition of multiparty cryptographic protocols [J].
Canetti, R .
JOURNAL OF CRYPTOLOGY, 2000, 13 (01) :143-202
[7]  
*DIS, 1997, 117703 DIS
[8]  
GUREVICH Y, 1997, CSETR33697 U MICHIGA
[9]  
GUREVICH Y, 1993, SPECIFICATION VALIDA, P9
[10]   Weakness in the Helsinki protocol [J].
Horng, G ;
Hsu, CK .
ELECTRONICS LETTERS, 1998, 34 (04) :354-355