Advertisement

Specifying Authentication Using Signal Events in CSP

  • Siraj A. Shaikh
  • Vicky J. Bush
  • Steve A. Schneider
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3822)

Abstract

The formal analysis of cryptographic protocols has firmly developed into a comprehensive body of knowledge, building on a wide variety of formalisms and treating a diverse range of security properties, foremost of which is authentication. The formal specification of authentication has long been a subject of examination. In this paper, we discuss the use of correspondence to formally specify authentication and focus on Schneider’s use of signal events in CSP to specify authentication. The purpose of this effort is to strengthen this formalism further. We develop a formal structure for these events and use them to specify a general authentication property. We then develop specifications for recentness and injectivity as sub-properties, and use them to refine authentication further. Our work is motivated by the desire to effectively analyse and express security properties in formal terms, so as to make them precise and clear.

Keywords

Authentication Protocol Security Protocol Security Property Data Part Cryptographic Protocol 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Gollmann, D.: What do we mean by entity authentication? In: Symposium on Security and Privacy, pp. 46–54. IEEE Computer Society, Los Alamitos (1996)Google Scholar
  2. 2.
    Gollmann, D.: On the Verification of Cryptographic Protocols - A Tale of Two Committees. In: Proceedings of the Workshop on Secure Architectures and Information Flow, ENTCS, vol. 32 (2000)Google Scholar
  3. 3.
    Gollmann, D.: Analysing security protocols. In: Abdallah, A.E., Ryan, P.Y.A., Schneider, S. (eds.) FASec 2002. LNCS, vol. 2629, pp. 71–80. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  4. 4.
    Gollmann, D.: Authentication by Correspondence. IEEE Journal on Selected Areas in Communication, Special Issue on Formal Methods for Security 21(1) (2003)Google Scholar
  5. 5.
    Gordon, A.D., Jeffrey, A.: Typing correspondence assertions for communication protocols. In: Mathematical Foundations of Programming Semantics 17, ENTCS, vol. 45, Elsevier, Amsterdam (2001)Google Scholar
  6. 6.
    Hoare, C.A.R.: Communicating Sequential Processes. Prentice-Hall International, Englewood Cliffs (1985)zbMATHGoogle Scholar
  7. 7.
    Lowe, G.: A hierarchy of authentication specifications. In: 10th Computer Security Foundations Workshop, pp. 31–43. IEEE Computer Society Press, Los Alamitos (1995)Google Scholar
  8. 8.
    Lowe, G.: An attack on the Needham-Schroeder public key protocol. Information Processing Letters 56, 131–133 (1995)zbMATHCrossRefGoogle Scholar
  9. 9.
    Meadows, C.: What makes a cryptographic protocol secure? The evolution of requirements specification in formal cryptographic protocol analysis. In: Degano, P. (ed.) ESOP 2003. LNCS, vol. 2618, pp. 10–21. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  10. 10.
    Needham, R., Schroeder, M.: Using encryption for Authentication in Large Networks. Communications of the ACM 21(12), 993–999 (1978)zbMATHCrossRefGoogle Scholar
  11. 11.
    Roscoe, A.W.: The Theory and Practice of Concurrency. Prentice-Hall International, Englewood Cliffs (1997)Google Scholar
  12. 12.
    Ryan, P., Schneider, S., Goldsmith, M., Lowe, G., Roscoe, B.: Modelling and Analysis of Security Protocols. Addison-Wesley, Reading (2001)Google Scholar
  13. 13.
    Schneider, S.: Security Properties and CSP. IEEE Symposium Research in Security and Privacy (1996)Google Scholar
  14. 14.
    Schneider, S.: Verifying Authentication Protocols in CSP. IEEE Transactions on Software Engineering 24(9), 741–758 (1998)CrossRefGoogle Scholar
  15. 15.
    Schneider, S.: Concurrent and Real-time Systems: the CSP Approach. Addison-Wesley, London (1999)Google Scholar
  16. 16.
    Shaikh, S., Bush, V., Schneider, S.: Kerberos – Specifying authenticity properties using signal events. In: Proceedings of the Indonesia Cryptology and Information Security Conference, pp. 87–93 (2005)Google Scholar
  17. 17.
    Woo, T.Y.C., Lam, S.S.: A semantic model for Authentication Protocols. IEEE Symposium on Security and Privacy, 178–194 (1993)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Siraj A. Shaikh
    • 1
  • Vicky J. Bush
    • 1
  • Steve A. Schneider
    • 2
  1. 1.Department of Computing, UGBSUniversity of GloucestershireCheltenham SpaUK
  2. 2.Department of Computing, SEPSUniversity of SurreyGuildford, SurreyUK

Personalised recommendations