Title :
Relating strands and multiset rewriting for security protocol analysis
Author :
Cervesato, I. ; Durgin, N. ; Mitchell, J. ; Lincoln, P. ; Scedrov, A.
Author_Institution :
ITT Ind., USA
Abstract :
Formal analysis of security protocols is largely based on an set of assumptions commonly referred to as the Dolev-Yao model. Two formalisms that state the basic assumptions of this model are related here: strand spaces and multiuser rewriting with existential quantification. Although it is fairly intuitive that these two languages should be equivalent in some way, a number of modifications to each system are required to obtain a meaningful equivalence. We extend the strand formalism with a way of incrementally growing bundles in order to emulate an execution of a protocol with parametric strands. We omit the initialization part of the multiset rewriting setting, which formalizes the choice of initial data, such as shared public or private keys, and which has no counterpart in the stand space setting. The correspondence between the modified formalisms directly relates the intruder theory from the multiset rewriting formalism to the penetrator strands
Keywords :
cryptography; protocols; rewriting systems; security of data; Dolev-Yao model; existential quantification; formal analysis; intruder theory; multiset rewriting; multiuser rewriting; penetrator strands; security protocol analysis; security protocols; strand formalism; strand spaces; Access protocols; Computer security; Contracts; Cryptographic protocols; Cryptography; Data security; Information security; Logic; Protection; State-space methods;
Conference_Titel :
Computer Security Foundations Workshop, 2000. CSFW-13. Proceedings. 13th IEEE
Conference_Location :
Cambridge
Print_ISBN :
0-7695-0671-2
DOI :
10.1109/CSFW.2000.856924