scispace - formally typeset
Proceedings ArticleDOI

Authentication via localized names

Reads0
Chats0
TLDR
The /spl pi/-calculus, which has been given an operational semantics that provides each sequential process of a system with its own local space of names, is exploited here to guarantee by construction that a message has been generated by a given entity.
Abstract
We address the problem of message authentication using the /spl pi/-calculus, which has been given an operational semantics that provides each sequential process of a system with its own local space of names. We exploit here that semantics and its localized names to guarantee by construction that a message has been generated by a given entity. Therefore, our proposal can be seen as a reference for the analysis of "real" protocols. As an example, we study the way authentication is ensured by encrypting messages in the spi-calculus.

read more

Citations
More filters
Journal ArticleDOI

Enhanced operational semantics: a tool for describing and analyzing concurrent systems

TL;DR: The focus is on how enriching the labels of transitions with encodings of their deduction trees is sufficient to derive qualitative and quantitative information on the systems in hand simply by relabeling the transitions of a unique concrete model.
Journal Article

A compiler for analyzing cryptographic protocols using non-interference

TL;DR: The VSP/CVS technology is very powerful, and its usefulness is shown with some case studies: the Woo-Lam one-way authentication protocol, for which a new attack to authentication is found, and the Wide Mouthed Frog protocol, where different kinds of attack are detected and analyzed.
Proceedings ArticleDOI

CVS: a compiler for the analysis of cryptographic protocols

TL;DR: The VSP/CVS technology is very powerful and its usefulness is shown with the case-study of the Woo-Lam one-way authentication protocol, for which an attack undocumented in the literature is found.
Journal ArticleDOI

A compiler for analyzing cryptographic protocols using noninterference

TL;DR: In this paper, the authors propose a protocol specification language more abstract than SPA, called VSP, and a compiler CVS that automatically generates the SPA specification for a given protocol described in VSP.

Classification of Security Properties - Part II: Network Security.

TL;DR: This paper is based on the results of [20,22-25] and covers the second part of the course Classification of Security Properties given by Roberto Gorrieri and Riccardo Focardi at the F OSAD'00 and FOSAD'01 schools.
References
More filters
Journal ArticleDOI

A calculus of mobile processes, II

TL;DR: The a-calculus is presented, a calculus of communicating systems in which one can naturally express processes which have changing structure, including the algebraic theory of strong bisimilarity and strong equivalence, including a new notion of equivalence indexed by distinctions.
Journal ArticleDOI

A logic of authentication

TL;DR: This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.

[서평]「Applied Cryptography」

염흥렬
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Journal ArticleDOI

A Calculus of Mobile Processes - Part II

TL;DR: The purpose of the present paper is to provide a detailed presentation of some of the theory of the calculus developed to date, and in particular to establish most of the results stated in the companion paper.
Proceedings ArticleDOI

A calculus for cryptographic protocols: the spi calculus

TL;DR: The spi calculus is introduced, an extension of the pi calculus designed for describing and analyzing cryptographic protocols and state their security properties in terms of coarse-grained notions of protocol equivalence.