2010
DOI: 10.1007/978-3-642-12808-0_2
|View full text |Cite
|
Sign up to set email alerts
|

Executable Specification of Cryptofraglets in Maude for Security Verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

1
3
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
1
1
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 10 publications
1
3
0
Order By: Relevance
“…The current paper extends the work in [17] by 1) enriching the cryptofraglets set of instructions with specific functionalities for hashing and message authentication coding: these functionalities are particularly significant, as they are used as basic building blocks in many protocols; 2) refining the fraglets threat model and the notion of the adversary knowledge (with respect to what proposed in [17]), i.e., the set of messages an adversary knows between the beginning and end of a protocol run; 3) proposing an extended executable specification of cryptofraglets in Maude. Effectiveness of the enhanced framework is demonstrated by presenting a Maude specification of a privacy preserving RFID identification protocol, RIPP-FS [5,6], under the fraglets communication paradigm.…”
Section: Introductionsupporting
confidence: 79%
See 1 more Smart Citation
“…The current paper extends the work in [17] by 1) enriching the cryptofraglets set of instructions with specific functionalities for hashing and message authentication coding: these functionalities are particularly significant, as they are used as basic building blocks in many protocols; 2) refining the fraglets threat model and the notion of the adversary knowledge (with respect to what proposed in [17]), i.e., the set of messages an adversary knows between the beginning and end of a protocol run; 3) proposing an extended executable specification of cryptofraglets in Maude. Effectiveness of the enhanced framework is demonstrated by presenting a Maude specification of a privacy preserving RFID identification protocol, RIPP-FS [5,6], under the fraglets communication paradigm.…”
Section: Introductionsupporting
confidence: 79%
“…Section 2 recalls the fraglets model and introduces a refined version of cryptofraglets. Section 3 revises the threat model for cryptofraglets proposed in [17]. Section 4 introduces the executable specification of cryptofraglets in Maude.…”
Section: Introductionmentioning
confidence: 99%
“…The fraglets model has been extensively adopted in BIONETS and some security and trust extensions to the original model have become necessary to make it a running framework. That was the main reason why cryptofraglets were born, first from a theoretical point of view, then realising a prototypal implementation of cryptofraglets in Maude to run some toy example analyses [17]. Successively, the implementation was extended in [25], to deal with a larger set of cryptographic primitives, widely adopted in standard security protocols.…”
Section: Related Workmentioning
confidence: 99%
“…This led to the definition of cryptofraglets, i.e., fraglets enriched with capabilities of encrypting, decrypting, signing, and verifying signatures over a series of symbols. Successively, work in [17] showed a more concrete advancement towards adopting fraglets for security modelling and verification, by proposing an executable specification of cryptofraglets in Maude [4,18], the popular engine based on rewriting logic [20].…”
mentioning
confidence: 99%