DocumentCode
2994737
Title
Safe simplifying transformations for security protocols or not just the Needham Schroeder pubic key protocol
Author
Hui, Mei Lin ; Lowe, Gavin
Author_Institution
Dept. of Math. & Comput. Sci., Leicester Univ., UK
fYear
1999
fDate
1999
Firstpage
32
Lastpage
43
Abstract
Recent techniques for analyzing security protocols have tended to concentrate upon the small protocols that are typically found in the academic literature. However there is a huge gulf between these and most large commercial protocols: the latter typically have many more fields, and much higher levels of nested encryption. As a result, existing techniques are difficult to apply directly to these large protocols. In this paper we develop the notion of safe simplifying transformations: transformations that have the property of preserving insecurities; the effect of such transformations is that if we can verify the transformed protocol, then we will have verified the original protocol. We identify a number of such safe simplifying transformations, and use them in the analysis of a commercial protocol
Keywords
computational complexity; protocols; public key cryptography; Needham Schroeder pubic key protocol; nested encryption; safe simplifying transformations; security protocols; Computer science; Computer security; Cryptographic protocols; Cryptography; Electrical capacitance tomography; Electronic mail; Mathematics; Public key; State-space methods; Tellurium;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Security Foundations Workshop, 1999. Proceedings of the 12th IEEE
Conference_Location
Mordano
ISSN
1063-6900
Print_ISBN
0-7695-0201-6
Type
conf
DOI
10.1109/CSFW.1999.779760
Filename
779760
Link To Document