scispace - formally typeset
Proceedings ArticleDOI

Mixed strand spaces

Reads0
Chats0
TLDR
This paper identifies a simple and easily verified characteristic of protocols, and shows that the Otway-Rees protocol remains correct even when used in combination with other protocols that have this characteristic.
Abstract
Strand space analysis is a method for stating and proving correctness properties for cryptographic protocols. In this paper we apply the same method to the related problem of mixed protocols, and show that a protocol can remain correct even when used in combination with a range of other protocols. We illustrate the method with the familiar Otway-Rees protocol. We identify a simple and easily verified characteristic of protocols, and show that the Otway-Rees protocol remains correct even when used in combination with other protocols that have this characteristic. We also illustrate this method on the Neuman-Stubblebine protocol. This protocol has two parts, an authentication protocol (I) in which a key distribution center creates and distributes a Kerberos-like key, and a reauthentication protocol (II) in which a client resubmits a ticket containing that key. The re-authentication protocol II is known to be flawed. We show that in the presence of protocol II, there are also attacks against protocol I. We then define a variant of protocol II, and prove an authentication property of I that holds even in combination with the modified II.

read more

Content maybe subject to copyright    Report

Citations
More filters

Scyther : semantics and verification of security protocols

Cas Cremers
TL;DR: This thesis develops a formal model for the description and analysis of security protocols at the process level, and develops an automated veri??cation procedure, which improves over existing methods and is applied in two novel case studies.
Journal ArticleDOI

Formal methods for cryptographic protocol analysis: emerging issues and trends

TL;DR: Some of the ongoing work in the application of formal methods to cryptographic protocol analysis is described, as well as some of the new challenges and the ways in which they are being met.
Journal ArticleDOI

Protocol Composition Logic (PCL)

TL;DR: PCL supports compositional reasoning about complex security protocols and has been applied to a number of industry standards including SSL/TLS, IEEE 802.11i and Kerberos V5.
Proceedings ArticleDOI

How to prevent type flaw attacks on security protocols

TL;DR: This paper proves that type flaw attacks can be prevented using a simple technique of tagging each field with some information indicating its intended type.
Journal ArticleDOI

A derivation system and compositional logic for security protocols

TL;DR: A general framework for deriving security protocols from simple components, using composition, refinements, and transformations is proposed, and the derivation system provides a framework for further improvements.
References
More filters
Journal ArticleDOI

A logic of authentication

TL;DR: This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.
Proceedings ArticleDOI

A logic of authentication

TL;DR: This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.

The Kerberos Network Authentication Service (V5)

J. Kohl, +1 more
TL;DR: This document gives an overview and specification of Version 5 of the protocol for the Kerberos network authentication system, presently in production use at MIT's Project Athena, and at other Internet sites.
Journal ArticleDOI

Strand spaces: proving security protocols correct

TL;DR: The approach is distinguished from other work by the simplicity of the model, the precision of the results it produces, and the ease of developing intelligible and reliable proofs even without automated support.
Proceedings ArticleDOI

Casper: a compiler for the analysis of security protocols

TL;DR: Casper is described, a program that automatically produces the CSP description from a more abstract description, thus greatly simplifying the modelling and analysis process.
Related Papers (5)