Title :
Handling infeasible specifications of cryptographic protocols
Author_Institution :
ORA Corp., Ithaca, NY, USA
Abstract :
In the verification of cryptographic protocols using the authentication logic of Burrows, Abadi, and Needham (1989) it is possible to write a specification which does not faithfully represent the real world situation. Such a specification, though impossible or unreasonable to implement, can go undetected and be verified to be correct. It can also lead to logical statements that do not preserve causality which in turn can have undesirable consequences. Such a specification, called an infeasible specification, can be subtle and hard to locate. The article shows how the logic of cryptographic protocols of Gong, Needham, and Yahalom (1990) can be enhanced with a notion of eligibility to preserve causality of beliefs and detect infeasible specifications. It is conceivable that this technique can be adopted in other similar logics
Keywords :
cryptography; formal logic; formal specification; protocols; causality; cryptographic protocols; eligibility; infeasible specification; verification; Authentication; Body sensor networks; Computer science; Concrete; Cryptographic protocols; Cryptography; Encoding; Guidelines; Logic; Timing;
Conference_Titel :
Computer Security Foundations Workshop IV, 1991. Proceedings
Conference_Location :
Franconia, NH
Print_ISBN :
0-8186-2215-6
DOI :
10.1109/CSFW.1991.151575