Title :
A hierarchy of authentication specifications
Author_Institution :
Dept. of Math. & Comput. Sci., Leicester Univ., UK
Abstract :
Many security protocols have the aim of authenticating one agent to another. Yet there is no clear consensus in the academic literature about precisely what “authentication” means. We suggest that the appropriate authentication requirement will depend upon the use to which the protocol is put, and identify several possible definitions of “authentication”. We formalize each definition using the process algebra CSP, use this formalism to study their relative strengths, and show how the model checker FDR can be used to test whether a system running the protocol meets such a specification
Keywords :
authorisation; communicating sequential processes; formal specification; formal verification; message authentication; protocols; authentication requirement; authentication specifications hierarchy; model checker FDR; process algebra CSP; security protocols; Algebra; Authentication; Computer science; Computer security; Control systems; Mathematics; Protocols; Stress; System testing;
Conference_Titel :
Computer Security Foundations Workshop, 1997. Proceedings., 10th
Conference_Location :
Rockport, MA
Print_ISBN :
0-8186-7990-5
DOI :
10.1109/CSFW.1997.596782