Developing Security Protocols by Refinement

被引:12
|
作者
Sprenger, Christoph [1 ]
Basin, David [1 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
来源
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10) | 2010年
关键词
Security protocols; stepwise refinement; formal development; entity authentication; key establishment; KEY; MODELS;
D O I
10.1145/1866307.1866349
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides the transformation of abstract security goals into protocols that are secure when operating over an insecure channel controlled by a Dolev-Yao-style intruder. The refinement steps successively introduce local states, an intruder, communication channels with security properties, and cryptographic operations realizing these channels. The abstractions used provide insights on how the protocols work and foster the development of families of protocols sharing a common structure and properties. In contrast to post-hoc verification methods, protocols are developed together with their correctness proofs. We have implemented our method in Isabelle/HOL and used it to develop different entity authentication and key transport protocols.
引用
收藏
页码:361 / 374
页数:14
相关论文
共 50 条
  • [31] Security of RFID Protocols - A Case Study
    van Deursen, Ton
    Radomirovic, Sasa
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 244 : 41 - 52
  • [32] Towards a Quantitative Analysis of Security Protocols
    Adao, Pedro
    Mateus, Paulo
    Reis, Tiago
    Vigano, Luca
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 164 (03) : 3 - 25
  • [33] Developing a Consensus Algorithm Using Stepwise Refinement
    Bryans, Jeremy W.
    FORMAL METHODS AND SOFTWARE ENGINEERING, 2011, 6991 : 553 - 568
  • [34] A Calculus for the Analysis of Wireless Network Security Protocols
    Ballardin, Francesco
    Merro, Massimo
    FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 206 - 222
  • [35] An IDE for the Design, Verification and Implementation of Security Protocols
    Garcia, Remi
    Modesti, Paolo
    2017 IEEE 28TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW 2017), 2017, : 157 - 163
  • [36] Soft constraint programming to analysing security protocols
    Bella, G
    Bistarelli, S
    THEORY AND PRACTICE OF LOGIC PROGRAMMING, 2004, 4 : 545 - 572
  • [37] SeVe: automatic tool for verification of security protocols
    Anh Tuan Luu
    Sun, Jun
    Liu, Yang
    Dong, Jin Song
    Li, Xiaohong
    Thanh Tho Quan
    FRONTIERS OF COMPUTER SCIENCE, 2012, 6 (01) : 57 - 75
  • [38] Quantifying the Security Cost of Migrating Protocols to Practice
    Patton, Christopher
    Shrimpton, Thomas
    ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT I, 2020, 12170 : 94 - 124
  • [39] OFMC: A symbolic model checker for security protocols
    Basin D.
    Mödersheim S.
    Viganò L.
    International Journal of Information Security, 2005, 4 (3) : 181 - 208
  • [40] Advancing the Automation Capability of Verifying Security Protocols
    Wang, Wansen
    Huang, Wenchao
    Meng, Zhaoyi
    Xiong, Yan
    Su, Cheng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5059 - 5070