2007 IEEE International Conference on Intelligent Computer Communication and Processing 2007
DOI: 10.1109/iccp.2007.4352155
|View full text |Cite
|
Sign up to set email alerts
|

Verifying the Independence of Security Protocols

Abstract: Determining if two protocols can be securely run alongside each other requires analyzing the independence of the involved protocols. In this paper we construct a canonical model of security protocols that allows us to conduct a syntactical analysis on the independence of multiple security protocols. By integrating participant knowledge in the model, we are able to detect subtle multi-protocol attacks, where the types of certain message components can not be checked, also known as type-flaw attacks. Of special … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2008
2008
2014
2014

Publication Types

Select...
4

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…By inspecting the rather large number of reported attacks in the literature [14], [18], [20] we can agree that any modification brought upon a protocol can influence its existing security properties. Based on these concerns, the authors have developed in a previous paper [17] a framework for verifying the composability of security protocols.…”
Section: Security Requirementsmentioning
confidence: 99%
See 2 more Smart Citations
“…By inspecting the rather large number of reported attacks in the literature [14], [18], [20] we can agree that any modification brought upon a protocol can influence its existing security properties. Based on these concerns, the authors have developed in a previous paper [17] a framework for verifying the composability of security protocols.…”
Section: Security Requirementsmentioning
confidence: 99%
“…The first step towards the composition of these protocols consists in verifying the "key-secrecy independence" security requirement formulated by the authors in [17]. To achieve this, we specify the secret terms for the two involved protocols.…”
Section: Term Composition Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…A collection of strands is called a strand space. The strand space model was introduced by Guttman et all in [9] and extended by the authors with participant knowledge, specialized basic sets and explicit term construction in [10]. The resulting model is called a kstrand space.…”
Section: K-strands and K-strand Spacesmentioning
confidence: 99%
“…In this section we briefly present the concept of knowledge strands (k-strands) and typed strands (tstrands) used to model protocol participants. For a more detailed presentation, the reader is asked to consult the authors previous work [10].…”
Section: K-strands and T-strandsmentioning
confidence: 99%