Developing Security Protocols by Refinement

被引:12
|
作者
Sprenger, Christoph [1 ]
Basin, David [1 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
来源
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10) | 2010年
关键词
Security protocols; stepwise refinement; formal development; entity authentication; key establishment; KEY; MODELS;
D O I
10.1145/1866307.1866349
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides the transformation of abstract security goals into protocols that are secure when operating over an insecure channel controlled by a Dolev-Yao-style intruder. The refinement steps successively introduce local states, an intruder, communication channels with security properties, and cryptographic operations realizing these channels. The abstractions used provide insights on how the protocols work and foster the development of families of protocols sharing a common structure and properties. In contrast to post-hoc verification methods, protocols are developed together with their correctness proofs. We have implemented our method in Isabelle/HOL and used it to develop different entity authentication and key transport protocols.
引用
收藏
页码:361 / 374
页数:14
相关论文
共 50 条
  • [1] Refining security protocols
    Sprenger, Christoph
    Basin, David
    JOURNAL OF COMPUTER SECURITY, 2018, 26 (01) : 71 - 120
  • [2] Observational equivalence and security games: Enhancing the formal analysis of security protocols
    Cai, Liujia
    Cai, Guangying
    Lu, Siqi
    Li, Guangsong
    Wang, Yongjuan
    COMPUTERS & SECURITY, 2024, 140
  • [3] Timed analysis of security protocols
    Corin, R.
    Etalle, S.
    Hartel, P.
    Mader, A.
    JOURNAL OF COMPUTER SECURITY, 2007, 15 (06) : 619 - 645
  • [4] Automated design of security protocols
    Hao, C
    Clark, JA
    Jacob, JL
    COMPUTATIONAL INTELLIGENCE, 2004, 20 (03) : 503 - 516
  • [5] Secrecy correctness for security protocols
    Adi, K
    Pene, L
    DFMA '05: FIRST INTERNATIONAL CONFERENCE ON DISTRIBUTED FRAMEWORKS FOR MULTIMEDIA APPLICATIONS, PROCEEDINGS, 2004, : 22 - 29
  • [6] Safely composing security protocols
    Véronique Cortier
    Stéphanie Delaune
    Formal Methods in System Design, 2009, 34 : 1 - 36
  • [7] Safely composing security protocols
    Cortier, Veronique
    Delaune, Stephanie
    FORMAL METHODS IN SYSTEM DESIGN, 2009, 34 (01) : 1 - 36
  • [8] Sessions and Separability in Security Protocols
    Carbone, Marco
    Guttman, Joshua D.
    PRINCIPLES OF SECURITY AND TRUST, POST 2013, 2013, 7796 : 267 - 286
  • [9] Timed Analysis of Security Protocols
    Szymoniak, Sabina
    Siedlecka-Lamch, Olga
    Kurkowski, Miroslaw
    INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY - ISAT 2016 - PT II, 2017, 522 : 53 - 63
  • [10] DYNAMIC TAGS FOR SECURITY PROTOCOLS
    Arapinis, Myrto
    Delaune, Stephanie
    Kremer, Steve
    LOGICAL METHODS IN COMPUTER SCIENCE, 2014, 10 (02)