Compositional analysis of authentication protocols

被引:0
|
作者
Bugliesi, M [1 ]
Focardi, R [1 ]
Maffei, M [1 ]
机构
[1] Univ Ca Foscari Venezia, Dipartimento Informat, I-30172 Venice, Ve, Italy
来源
PROGRAMMING LANGUAGES AND SYSTEMS | 2004年 / 2986卷
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We propose anew method for the static analysis of entity authentication protocols. We develop our approach based on a dialect of the spi-calculus as the underlying formalism for expressing protocol narrations. Our analysis validates the honest protocol participants against static (hence decidable) conditions that provide formal guarantees of entity authentication. The main result is that the validation of each component is provably sound and fully compositional: if all the protocol participants are successfully validated, then the protocol as a whole guarantees entity authentication in the presence of Dolev-Yao intruders.
引用
收藏
页码:140 / 154
页数:15
相关论文
共 50 条
  • [1] Compositional analysis of contract signing protocols
    Backes, M
    Datta, A
    Derek, A
    Mitchell, JC
    Turuani, M
    18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2005, : 94 - 110
  • [2] Web security: Authentication protocols and their analysis
    Wen, W
    Mizoguchi, F
    NEW GENERATION COMPUTING, 2001, 19 (03) : 283 - 299
  • [3] Web security: Authentication protocols and their analysis
    Wu Wen
    Fumio Mizoguchi
    New Generation Computing, 2001, 19 : 283 - 299
  • [4] ON THE FORMAL ANALYSIS OF PKCS AUTHENTICATION PROTOCOLS
    GAARDER, K
    SNEKKENES, E
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 453 : 106 - 121
  • [5] Analysis of typed analyses of authentication protocols
    Bugliesi, M
    Focardi, R
    Maffei, M
    18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2005, : 112 - 125
  • [6] Compositional analysis of contract-signing protocols
    Backes, Michael
    Datta, Anupam
    Derek, Ante
    Mitchell, John C.
    Turuani, Mathieu
    THEORETICAL COMPUTER SCIENCE, 2006, 367 (1-2) : 33 - 56
  • [7] Traceability Analysis of Recent RFID Authentication Protocols
    Alavi, Seyed Mohammad
    Baghery, Karim
    Abdolmaleki, Behzad
    Aref, Mohammad Reza
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 83 (03) : 1663 - 1682
  • [8] VANET authentication protocols: security analysis and a proposal
    Piramuthu, Otto B.
    Caesar, Matthew
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (02): : 2153 - 2179
  • [9] On vulnerability analysis of several password authentication protocols
    Garrett, Keith
    Talluri, S. Raghu
    Roy, Swapnoneel
    INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2015, 11 (03) : 167 - 176
  • [10] Security Analysis of Some RFID Authentication Protocols
    Wang Shaohui
    Wang Faxing
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 386 - 389