Abstract
The primary objective of this paper is to present the definition of a new dynamic, linear and modal logic for security protocols. The logic is compact, expressive and formal. It allows the specification of classical security properties (authentication, secrecy and integrity) and also electronic commerce properties (non-repudiation, anonymity, good atomicity, money atomicity, certified delivery, etc.). The logic constructs are interpreted over a trace-based model. Traces reflect valid protocol executions in the presence of a malicious smart intruder. The logic is endowed with a tableau-based proof system that leads to a modular denotational semantics.
This research is supported by a research grant from the National and Science Engineering Council, NSERC, and the Fonds pour la formation de Chercheurs et l’Aide à la Recherche, FCAR.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Martin Abadi and Andrew D. Gordon. A Calculus for Cryptographic Protocols: The Spi Calculus. In Proceedings of the Fourth ACM Conference on Computer and Communications Security. ACM Press, April 1997.
P. Bieber. A Logic of Communication in a Hostile Environment. In Proceedings of the Computer Security Foundations Workshop III, pages 14–22. IEEE Computer Society Press, 1990.
Dominique Bolignano. An Approach to the Formal Verification of Cryptographic Protocols. In Proceedings of the Third ACM Conference on Computer and Communications Security, CCS’96, New Delhi, India, pages 106–118. ACM Press, 1996.
M. Burrows, M. Abadi, and R. Needham. A Logic of Authentication. In Proceedings of the Royal Society of London A Vol. 426, pages 233–271, 1989.
U. Carlsen. Formal Specification and Analysis of Cryptographic Protocols. PhD thesis, Thèse d’Informatique soutenue à l’Université PARIS XI, October 1994.
C. A. R. Hoare. Communicating Sequential Processes. Prentice Hall, 1985.
V. Shmatikov J. C. Mitchell and U. Stern. Finite-state analysis of SSL 3.0. In Proceedings of the 7th USENIX Security Symposium (SECURITY-98), pages 201–216, Berkeley, January 26–29, 1998. Usenix Association.
R. A. Kemmerer. Using Formal Verification Techniques to Analyze Encryption Protocols. In Proceedings of the 1987 IEEE Symposium on Research in Security and Privacy, pages 134–139. IEEE Computer Society Press, 1987.
Gavin Lowe. An Attack on the Needham-Schroeder Public Key Authentication Protocol. Information Processing Letters, 56(3):131–136, November 1995.
Gavin Lowe. Some New Attacks upon Security Protocols. In Proceedings of the Computer Security Foundations Workshop VIII. IEEE Computer Society Press, 1996.
Einar Snekkenes. Authentication in Open Systems. In 10th IFIP WG 6.1 Symposium on Protocol Specification, Testing and Verification, pages 313–324, June 1990.
Einar Snekkenes. Formal Specification and Analysis of Cryptographic Protocols. PhD thesis, Faculty of Mathematics and Natural Sciences, University of Oslo, Norwegian Defence Research Establishment, P.O. Box 25, N-2007, Kjeller, Norway, January 1995.
The commission of the European Communities CEC DG-XIII. Security Investigation Final Report. Technical Report S2011/7000/D010 7000 1000, CEC, September 1993.
Vijay Varadharajan. Verification of Network Security Protocols. Computers and Security, 8, December 1989.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Adi, K., Debbabi, M., Mejri, M. (2000). A New Logic for Electronic Commerce Protocols. In: Rus, T. (eds) Algebraic Methodology and Software Technology. AMAST 2000. Lecture Notes in Computer Science, vol 1816. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45499-3_35
Download citation
DOI: https://doi.org/10.1007/3-540-45499-3_35
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67530-3
Online ISBN: 978-3-540-45499-1
eBook Packages: Springer Book Archive