Specification of the MAA standard in VDM

  • G. I. Parkin
  • G. O'Neill
Part of the Lecture Notes in Computer Science book series (LNCS, volume 551)

Abstract

A detailed example is given of how a formal specification language has been used to specify an international banking standard on message authentication. It illustrates how a specification language can be used to specify and validate a standard.

Keywords

Main Loop Message Authentication Code Message Authentication Macro Block Interpretation Problem 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    BS 7102 (2):1989, 8731-02:1987. Banking — Approved algorithm for message authentication — Part 2: Message authenticator algorithms. Obtainable from: Sales Department, BSI, Linford Wood, Milton Keynes, MK14 6LE.Google Scholar
  2. [2]
    G.I. Parkin and G. O'Neill. Specification of the MAA Standard in VDM. NPL Report DITC 160/90. February 1990.Google Scholar
  3. [3]
    BS 7101:1989, ISO 8730:1986. Protecting authentic wholesale messages between financial institutions. Obtainable from: Sales Department, BSI, Linford Wood, Milton Keynes, MK14 6LE.Google Scholar
  4. [4]
    D.W. Davies and D.O. Clayden. The Message Authenticator Algorithm (MAA) and its Implementation. NPL Report DITC 109/88. February 1988.Google Scholar
  5. [5]
    C.B. Jones. Systematic Software Development Using VDM. Prentice-Hall International, 1986.Google Scholar
  6. [6]
    M.K.F. Lai. A formal interpretation of the MAA standard in Z. NPL Report DITC 184/91. June 1991.Google Scholar
  7. [7]
    H.B. Munster. LOTOS specification of the MAA standard. NPL Report to be published.Google Scholar
  8. [8]
    C.L.N. Ruggles (Ed.). Formal Methods in Standards, A Report from the BCS Working Group. Springer-Verlag, 1990.Google Scholar
  9. [9]
    M. Wolczko. Typesetting VDM in LAT E X. Dept. of Computer Science, The University, Manchester, M13 9PL. March 1988.Google Scholar
  10. [10]
    BSI IST/5/19. VDM Specification Language Proto-Standard. British Standards Institution, 29 March 1990.Google Scholar
  11. [11]
    I.P. Dickinson. Typesetting VDM-SL with V DM S L macros. National Physical Laboratory, Teddington, Middlesex, TW11 0LW. 20 February 1991.Google Scholar
  12. [12]
    IEC/ISO. Rules for the drafting and presentation of International Standards. 1986.Google Scholar
  13. [13]
    ISO/DIS 8730, Banking — Requirements for message authentication (wholesale). 1987.Google Scholar
  14. [14]
    D.W. Davies and W.L. Price. Security for Computer Networks, An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer. John Wiley & Sons, 1984.Google Scholar
  15. [15]
    B.W. Kernighan and D.M. Ritchie. The C Programming Language. Prentice-Hall, 1978.Google Scholar
  16. [16]
    D.A. Turner. An Overview of Miranda. SIGPLAN Notices, December 1986.Google Scholar
  17. [17]
    ISO/IEC JTC1 SC22/WG13/D106. Modula-2 Standard, Third Working Draft. British Standards Institution, 29 October 1989.Google Scholar
  18. [18]
    R.P. Lampard. An implementation of MAA from a VDM specification. NPL Technical Memorandum DITC 50/91. January 1991.Google Scholar
  19. [19]
    D.J.Andrews, A. Garg, S.P.A. Lau, J.R. Pitchers. The Formal Definition of Modula-2 and Its Associated Interpreter. Lecture Notes in Computer Science, Vol 328, Springer-Verlag 1988.Google Scholar
  20. [20]
    D.J. Andrews. Report from the BSI Panel for the Standardisation of VDM (IST/5/50). Lecture Notes in Computer Science, Vol 328, Springer-Verlag 1988.Google Scholar
  21. [21]
    ISO/DIS 8731-2, Banking — Approved algorithm for message authentication — Part 2: Message authenticator algorithms, 1990.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1991

Authors and Affiliations

  • G. I. Parkin
    • 1
  • G. O'Neill
    • 1
  1. 1.Division of Information Technology and ComputingNational Physical LaboratoryTeddington

Personalised recommendations