Skip to main content

Update Semantics of Security Protocols

  • Chapter

Abstract

We present a model-theoretic approach for reasoning about security protocols, applying recent insights from dynamic epistemic logics. This enables us to describe exactly the subsequent epistemic states of the agents participating in the protocol, using Kripke models and transitions between these based on updates of the agents’ beliefs associated with steps in the protocol. As a case study we will consider the SRA Three Pass protocol and discuss the Wide-Mouthed Frog protocol.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Abadi, M. and A. Gordon: 1999, ‘A calculus for cryptographic protocols: The spicalculus’, Information and Computation 148, 1–70.

    Article  Google Scholar 

  • Abadi, M. and M. Tuttle: 1991, ‘A semantics for a logic of authentication’, in Proc. PODC’91, ACM, pp. 201–216.

    Google Scholar 

  • Agray, N., W. van der Hoek, and E. P. de Vink: 2001, ‘On BAN logics for industrial security protocols’, in B. Dunin-Keplicz and E. Nawarecki, (eds.), From Theory to Practice in Multi-Agent Systems, LNAI 2296, pp. 29–38.

    Google Scholar 

  • Anderson, R. J.: 2001, Security Engineering: A Guide to Building Dependable Distributed Systems, Wiley.

    Google Scholar 

  • Baltag, A.: 2002, ‘A logic for suspicous players: Epistemic actions and belief-updates in games’, Bulletin of Economic Research 54, 1–46.

    Article  Google Scholar 

  • Baltag, A.: and L. S. Moss: 2004, ‘Logics for epistemic programs’, Synthese: Knowledge, Rationality and Action 139, 165–224.

    Google Scholar 

  • Baltag, A., L. S. Moss, and S. Solecki: 1998, ‘The logic of public announcements, common knowledge and private suspicions’, in Itzhak Gilboa, (ed.), Proc. TARK’98, pp. 43–56.

    Google Scholar 

  • Bleeker, A. and L. Meertens: 1997, ‘A semantics for BAN logic’, in Proceedings DIMACS Workshop on Design and Formal Verification of Protocols, DIMACS, Rutgers University, http://dimacs.rutgers.edu/Workshops/Security.

    Google Scholar 

  • Burrows, M., M. Abadi, and R. M. Needham: 1990, ‘A logic of authentication’, ACM Transactions on Computer Systems 8, 16–36.

    Article  Google Scholar 

  • Clark, J. A. and J. L Jacob: 1997, ‘A survey of authentication protocols 1.0’, Technical Report, University of York.

    Google Scholar 

  • Dolev, D. and A. C. Yao: 1983, ‘On the security of public-key protocols’, IEEE Transaction on Information Theory 29, 198–208.

    Google Scholar 

  • Gerbrandy, J.: 1997, ‘Dynamic epistemic logic’, Technical Report LP-97-04, ILLC.

    Google Scholar 

  • Gerbrandy, J.: 1999, ‘Bisimulations on Planet Kripke’, PhD thesis, ILLC Dissertation Series 1999–01, University of Amsterdam.

    Google Scholar 

  • Hommersom, A. J.: 2003, ‘Reasoning about security’, Master’s thesis, Universiteit Utrecht.

    Google Scholar 

  • Kessler, V. and H. Neumann: 1998, ‘A sound logic for analyzing electronic commerce protocols’, in J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollman (eds.), Proc. ESORICS’98, LNCS 1485, pp. 345–360.

    Google Scholar 

  • Kooi, B.: 2003, ‘Knowledge, Chance, and Change’, PhD thesis, ILLC Dissertation Series 2003–01, University of Groningen.

    Google Scholar 

  • Lowe, G.: 1996, ‘Breaking and fixing the Needham-Schroeder public-key protocol using FDR’, Software-Concepts and Tools 17, 93–102.

    Google Scholar 

  • Roorda, J.-W., W. van der Hoek, and J.-J. Ch Meyer: 2002, ‘Iterated belief change in multi-agent systems’, in Proceedings of the First International Joint Conference on Autonomous Agents and Multi-Agent Systems: Part 2.

    Google Scholar 

  • Schneier, B.: 2000, Secrets and Lies: Digital Security in a Networked World, Wiley.

    Google Scholar 

  • Stubblebine, S. G. and R. N. Wright: 2002, ‘An authentication logic with formal semantics supporting synchronization, revocation and recency’, IEEE Transactions on Software Engineering 28, 256–285.

    Article  Google Scholar 

  • van Ditmarsch, H. P.: 2000, ‘Knowledge games’, PhD thesis, ILLC Dissertation Series 2000–06, University of Groningen.

    Google Scholar 

  • van Ditmarsch, H. P.: 2001, ‘The semantics of concurrent knowledge actions’, in M. Pauly and G. Sandu, (eds.), Proc. ESSLLI Workshop on Logic and Games, Helsinki.

    Google Scholar 

  • Wedel, G. and V. Kessler: 1996, ‘Formal semantics for authentication logics’, in E. Bertino, H. Kurth, G. Martello, and E. Montolivo, (eds.), Proc. ESORICS’ 96, LNCS 1146, pp. 219–241.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Kluwer Academic Publishers

About this chapter

Cite this chapter

Hommersom, A., Meyer, JJ., de Vink, E. (2004). Update Semantics of Security Protocols. In: Information, Interaction and Agency. Springer, Dordrecht. https://doi.org/10.1007/1-4020-4094-6_10

Download citation

Publish with us

Policies and ethics