Title :
Modeling security protocols using operational semantics
Author :
Samadi, Masoud ; Mahrooghi, Hamidreza ; Movaghar, Ali ; Faraahi, Ahmad
Author_Institution :
Dept. of Inf. Technol. & Commun., Payame noor Univ., Tehran, Iran
Abstract :
In this paper we develop a formal semantics of security protocols. Its main virtue is that it is a generic model, in the sense that it is parameterized over e.g. the intruder model. Further characteristics of the model are a straightforward handling of parallel execution of multiple protocols, locality of security claims, the binding of local constants to role instances, and explicitly defined initial intruder knowledge. We validate our framework by analyzing the Needham-Schroeder-Lowe protocol.
Keywords :
formal specification; protocols; security of data; Needham-Schroeder-Lowe protocol; initial intruder knowledge; local constants binding; multiple protocol handling; operational semantics; security claims locality; security protocol modeling; Cryptography; Protocols; Cryptographic; Formal method; Intruder model; Operational semantics;
Conference_Titel :
Educational and Information Technology (ICEIT), 2010 International Conference on
Conference_Location :
Chongqing
Print_ISBN :
978-1-4244-8033-3
Electronic_ISBN :
978-1-4244-8035-7
DOI :
10.1109/ICEIT.2010.5608394