Skip to main content

A Diagrammatic Approach to Information Flow in Encrypted Communication

  • Conference paper
  • First Online:
Graphical Models for Security (GraMSec 2020)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12419))

Included in the following conference series:

Abstract

We give diagrammatic tools to reason about information flow within encrypted communication. In particular, we are interested in deducing where information flow (communication or otherwise) has taken place, and fully accounting for all possible paths.

The core mathematical concept is using a single categorical diagram to model the underlying mathematics, the epistemic knowledge of the participants, and (implicitly) the potential or actual communication between participants. A key part of this is a ‘correctness’ or ‘consistency’ criterion that ensures we accurately & fully account for the distinct routes by which information may come to be known (i.e. communication and / or calculation).

We demonstrate how this formalism may be applied to answer questions about communication scenarios where we have the partial information about the participants and their interactions. Similarly, we show how to analyse the consequences of changes to protocols or communications, and to enumerate the distinct orders in which events may have occurred.

We use various forms of Diffie-Hellman key exchange as an illustration of these techniques. However, they are entirely general; an extended version of this paper [8] provides similar analyses of other protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Although it is standard to assume that Eve is an adversary to Alice and Bob, the tools themselves take a more agnostic approach. Our aim is to study information flow generally; we may be more concerned about information flow to Eve, but the models themselves treat her equally to the other participants.

  2. 2.

    We assume an implicit, fixed, embedding in order not to have to consider the graph embedding or graph isomorphism problem. In practice, this embedding is immediate from the interpretation.

  3. 3.

    I would like to thank various members of the Oxford school for the folklore that the ‘classical communication’ in these protocols – although often implicit – should properly be thought of as 2-categorical structure. It is pleasing to be able to claim that the same applies to implicit communication in classical protocols!.

References

  1. Abramsky, S.: Retracing some paths in process algebra. In: Montanari, U., Sassone, V. (eds.) CONCUR 1996. LNCS, vol. 1119, pp. 1–17. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-61604-7_44

    Chapter  Google Scholar 

  2. Abramsky, S., Coecke, B.: A categorical semantics of quantum protocols. In: Proceedings of the 19th Annual IEEE Symposium on Logic in Computer Science (LICS 2004), pp. 415–425. IEEE Computer Society Press (2005)

    Google Scholar 

  3. Amoroso, E.: Fundamentals of Computer Security Technology. Prentice-Hall Inc, USA (1994)

    MATH  Google Scholar 

  4. Barwise, J., Gabbay, D., Hartonas, C.: On the logic of information flow. Logic J. IGPL 3(7), 7–49 (1998)

    MathSciNet  MATH  Google Scholar 

  5. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theor. 22(6), 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  6. Eades III, H., Jiang, J., Bryant, A.: On linear logic, functional programming, and attack trees. In: Cybenko, G., Pym, D., Fila, B. (eds.) GraMSec 2018. LNCS, vol. 11086, pp. 71–89. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-15465-3_5

    Chapter  Google Scholar 

  7. Girard, J.-Y.: Geometry of interaction 1. In: Proceedings Logic Colloquium 1988, pp. 221–260. North-Holland (1988)

    Google Scholar 

  8. Hines, P.: A diagrammatic approach to information flow in encrypted communication (extended version). arxiv.org/abs/2008.05840 (2020)

  9. Horne, R., Mauw, S., Tiu, A.: Semantics for specialising attack trees based on linear logic. Fundamenta Informaticae 153(1–2), 57–86 (2017)

    Article  MathSciNet  Google Scholar 

  10. Ivanova, M.G., Probst, C.W., Hansen, R.R., Kammüller, F.: Transforming graphical system models to graphical attack models. In: Mauw, S., Kordy, B., Jajodia, S. (eds.) GraMSec 2015. LNCS, vol. 9390, pp. 82–96. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-29968-6_6

    Chapter  Google Scholar 

  11. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996). Discrete Mathematics and Its Applications

    MATH  Google Scholar 

  12. Merkle, R.: Secure communications over insecure channels. Commun. ACM 21(4), 294–299 (1978)

    Article  Google Scholar 

  13. O’Halloran, C.: Category theory applied to information flow for computer security. PhD thesis, Oxford University Computing Laboratory (1994)

    Google Scholar 

  14. Pavlovic, D.: Chasing diagrams in cryptography. In: Casadio, C., Coecke, B., Moortgat, M., Scott, P. (eds.) Categories and Types in Logic. Language, and Physics: Essays Dedicated to Jim Lambek on the Occasion of His 90th Birthday, pp. 353–367. Springer, Berlin Heidelberg (2014)

    Chapter  Google Scholar 

  15. Power, J.: 2-categories. Technical report NS-98-7, B.R.I.C.S., p. 18 (1998)

    Google Scholar 

  16. Schneier, B.: Attack trees: modeling security threats. Dr. Dobb’s J. Softw. Tools 24(12), 21–29 (1999)

    Google Scholar 

Download references

Acknowledgements

I have had the good fortune to encounter several cryptographically-minded category theorists, and category-curious cryptographers. Thanks are due to Chris Heunen (Edinburgh), Delaram Kahrobaei (York), Dusko Pavlovic (Hawaii), and Noson Yanofsky (New York). Thanks are also due to Morgan Hines, for help in finding the regular polyhedra in three or more dimensions associated with the protocols in [8].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Peter M. Hines .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hines, P.M. (2020). A Diagrammatic Approach to Information Flow in Encrypted Communication. In: Eades III, H., Gadyatskaya, O. (eds) Graphical Models for Security. GraMSec 2020. Lecture Notes in Computer Science(), vol 12419. Springer, Cham. https://doi.org/10.1007/978-3-030-62230-5_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-62230-5_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-62229-9

  • Online ISBN: 978-3-030-62230-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics