DocumentCode
2583032
Title
Reasoning about belief in cryptographic protocols
Author
Gong, Li ; Needham, Roger ; Yahalom, Raphael
Author_Institution
Comput. Lab., Cambridge Univ., UK
fYear
1990
fDate
7-9 May 1990
Firstpage
234
Lastpage
248
Abstract
A mechanism is presented for reasoning about belief as a systematic way to understand the working of cryptographic protocols. The mechanism captures more features of such protocols than that given by M. Burrows et al. (1989) to which the proposals are a substantial extension. The notion of possession incorporated in the approach assumes that principles can include in messages data they do not believe in, but merely possess. This also enables conclusions such as `Q possesses the shared key´, as in an example to be derived. The approach places a strong emphasis on the separation between the content and the meaning of messages. This can increase consistency in the analysis and, more importantly, introduce the ability to reason at more than one level. The final position in a given run will depend on the level of mutual trust of the specified principles participating in that run
Keywords
cryptography; protocols; belief reasoning; cryptographic protocols; shared key; Body sensor networks; Computational modeling; Computer security; Cryptographic protocols; Cryptography; Graphics; Information analysis; Laboratories; Logic; Proposals;
fLanguage
English
Publisher
ieee
Conference_Titel
Research in Security and Privacy, 1990. Proceedings., 1990 IEEE Computer Society Symposium on
Conference_Location
Oakland, CA
Print_ISBN
0-8186-2060-9
Type
conf
DOI
10.1109/RISP.1990.63854
Filename
63854
Link To Document