Abstract
We present a model-theoretic approach for reasoning about security protocols, applying recent insights from dynamic epistemic logics. This enables us to describe exactly the subsequent epistemic states of the agents participating in the protocol, using Kripke models and transitions between these based on updates of the agents’ beliefs associated with steps in the protocol. As a case study we will consider the SRA Three Pass protocol and discuss the Wide-Mouthed Frog protocol.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Abadi, M. and A. Gordon: 1999, ‘A calculus for cryptographic protocols: The spicalculus’, Information and Computation 148, 1–70.
Abadi, M. and M. Tuttle: 1991, ‘A semantics for a logic of authentication’, in Proc. PODC’91, ACM, pp. 201–216.
Agray, N., W. van der Hoek, and E. P. de Vink: 2001, ‘On BAN logics for industrial security protocols’, in B. Dunin-Keplicz and E. Nawarecki, (eds.), From Theory to Practice in Multi-Agent Systems, LNAI 2296, pp. 29–38.
Anderson, R. J.: 2001, Security Engineering: A Guide to Building Dependable Distributed Systems, Wiley.
Baltag, A.: 2002, ‘A logic for suspicous players: Epistemic actions and belief-updates in games’, Bulletin of Economic Research 54, 1–46.
Baltag, A.: and L. S. Moss: 2004, ‘Logics for epistemic programs’, Synthese: Knowledge, Rationality and Action 139, 165–224.
Baltag, A., L. S. Moss, and S. Solecki: 1998, ‘The logic of public announcements, common knowledge and private suspicions’, in Itzhak Gilboa, (ed.), Proc. TARK’98, pp. 43–56.
Bleeker, A. and L. Meertens: 1997, ‘A semantics for BAN logic’, in Proceedings DIMACS Workshop on Design and Formal Verification of Protocols, DIMACS, Rutgers University, http://dimacs.rutgers.edu/Workshops/Security.
Burrows, M., M. Abadi, and R. M. Needham: 1990, ‘A logic of authentication’, ACM Transactions on Computer Systems 8, 16–36.
Clark, J. A. and J. L Jacob: 1997, ‘A survey of authentication protocols 1.0’, Technical Report, University of York.
Dolev, D. and A. C. Yao: 1983, ‘On the security of public-key protocols’, IEEE Transaction on Information Theory 29, 198–208.
Gerbrandy, J.: 1997, ‘Dynamic epistemic logic’, Technical Report LP-97-04, ILLC.
Gerbrandy, J.: 1999, ‘Bisimulations on Planet Kripke’, PhD thesis, ILLC Dissertation Series 1999–01, University of Amsterdam.
Hommersom, A. J.: 2003, ‘Reasoning about security’, Master’s thesis, Universiteit Utrecht.
Kessler, V. and H. Neumann: 1998, ‘A sound logic for analyzing electronic commerce protocols’, in J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollman (eds.), Proc. ESORICS’98, LNCS 1485, pp. 345–360.
Kooi, B.: 2003, ‘Knowledge, Chance, and Change’, PhD thesis, ILLC Dissertation Series 2003–01, University of Groningen.
Lowe, G.: 1996, ‘Breaking and fixing the Needham-Schroeder public-key protocol using FDR’, Software-Concepts and Tools 17, 93–102.
Roorda, J.-W., W. van der Hoek, and J.-J. Ch Meyer: 2002, ‘Iterated belief change in multi-agent systems’, in Proceedings of the First International Joint Conference on Autonomous Agents and Multi-Agent Systems: Part 2.
Schneier, B.: 2000, Secrets and Lies: Digital Security in a Networked World, Wiley.
Stubblebine, S. G. and R. N. Wright: 2002, ‘An authentication logic with formal semantics supporting synchronization, revocation and recency’, IEEE Transactions on Software Engineering 28, 256–285.
van Ditmarsch, H. P.: 2000, ‘Knowledge games’, PhD thesis, ILLC Dissertation Series 2000–06, University of Groningen.
van Ditmarsch, H. P.: 2001, ‘The semantics of concurrent knowledge actions’, in M. Pauly and G. Sandu, (eds.), Proc. ESSLLI Workshop on Logic and Games, Helsinki.
Wedel, G. and V. Kessler: 1996, ‘Formal semantics for authentication logics’, in E. Bertino, H. Kurth, G. Martello, and E. Montolivo, (eds.), Proc. ESORICS’ 96, LNCS 1146, pp. 219–241.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2004 Kluwer Academic Publishers
About this chapter
Cite this chapter
Hommersom, A., Meyer, JJ., de Vink, E. (2004). Update Semantics of Security Protocols. In: Information, Interaction and Agency. Springer, Dordrecht. https://doi.org/10.1007/1-4020-4094-6_10
Download citation
DOI: https://doi.org/10.1007/1-4020-4094-6_10
Publisher Name: Springer, Dordrecht
Print ISBN: 978-1-4020-3600-2
Online ISBN: 978-1-4020-4094-8
eBook Packages: Humanities, Social Sciences and LawPhilosophy and Religion (R0)