• DocumentCode
    2994737
  • Title

    Safe simplifying transformations for security protocols or not just the Needham Schroeder pubic key protocol

  • Author

    Hui, Mei Lin ; Lowe, Gavin

  • Author_Institution
    Dept. of Math. & Comput. Sci., Leicester Univ., UK
  • fYear
    1999
  • fDate
    1999
  • Firstpage
    32
  • Lastpage
    43
  • Abstract
    Recent techniques for analyzing security protocols have tended to concentrate upon the small protocols that are typically found in the academic literature. However there is a huge gulf between these and most large commercial protocols: the latter typically have many more fields, and much higher levels of nested encryption. As a result, existing techniques are difficult to apply directly to these large protocols. In this paper we develop the notion of safe simplifying transformations: transformations that have the property of preserving insecurities; the effect of such transformations is that if we can verify the transformed protocol, then we will have verified the original protocol. We identify a number of such safe simplifying transformations, and use them in the analysis of a commercial protocol
  • Keywords
    computational complexity; protocols; public key cryptography; Needham Schroeder pubic key protocol; nested encryption; safe simplifying transformations; security protocols; Computer science; Computer security; Cryptographic protocols; Cryptography; Electrical capacitance tomography; Electronic mail; Mathematics; Public key; State-space methods; Tellurium;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Security Foundations Workshop, 1999. Proceedings of the 12th IEEE
  • Conference_Location
    Mordano
  • ISSN
    1063-6900
  • Print_ISBN
    0-7695-0201-6
  • Type

    conf

  • DOI
    10.1109/CSFW.1999.779760
  • Filename
    779760