Title :
From Qualitative to Quantitative Proofs of Security Properties Using First-Order Conditional Logic
Author_Institution :
Dept. of Comput. Sci., Cornell Univ., Ithaca, NY, USA
Abstract :
Security protocols, such as key-exchange and key management protocols, are short, but notoriously difficult to prove correct. Flaws have been found in numerous protocols, ranging from the the 802.11 Wired Equivalent Privacy (WEP) protocol used to protect link-layer communications from eavesdropping and other attacks to standards and proposed standards for Secure Socket Layer to Kerberos. Not surprisingly, a great deal of effort has been devoted to proving the correctness of such protocols. There are two largely disjoint approaches. The first essentially ignores the details of cryptography by assuming perfect cryptography and an adversary that controls the network. The second approach applies the tools of modern cryptography to proving correctness, using more quantitative arguments.
Keywords :
cryptographic protocols; formal logic; 802.11 wired equivalent privacy protocol; Kerberos; WEP protocol; eavesdropping; first-order conditional logic; key management protocol; key-exchange protocol; link-layer communications; perfect cryptography; qualitative proof; quantitative arguments; quantitative proof; secure socket layer; security property; security protocols; Cognition; Computer science; Cryptography; Polynomials; Protocols; Semantics;
Conference_Titel :
Logic in Computer Science (LICS), 2013 28th Annual IEEE/ACM Symposium on
Conference_Location :
New Orleans, LA
Print_ISBN :
978-1-4799-0413-6
DOI :
10.1109/LICS.2013.66