Abstract
We give diagrammatic tools to reason about information flow within encrypted communication. In particular, we are interested in deducing where information flow (communication or otherwise) has taken place, and fully accounting for all possible paths.
The core mathematical concept is using a single categorical diagram to model the underlying mathematics, the epistemic knowledge of the participants, and (implicitly) the potential or actual communication between participants. A key part of this is a ‘correctness’ or ‘consistency’ criterion that ensures we accurately & fully account for the distinct routes by which information may come to be known (i.e. communication and / or calculation).
We demonstrate how this formalism may be applied to answer questions about communication scenarios where we have the partial information about the participants and their interactions. Similarly, we show how to analyse the consequences of changes to protocols or communications, and to enumerate the distinct orders in which events may have occurred.
We use various forms of Diffie-Hellman key exchange as an illustration of these techniques. However, they are entirely general; an extended version of this paper [8] provides similar analyses of other protocols.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Although it is standard to assume that Eve is an adversary to Alice and Bob, the tools themselves take a more agnostic approach. Our aim is to study information flow generally; we may be more concerned about information flow to Eve, but the models themselves treat her equally to the other participants.
- 2.
We assume an implicit, fixed, embedding in order not to have to consider the graph embedding or graph isomorphism problem. In practice, this embedding is immediate from the interpretation.
- 3.
I would like to thank various members of the Oxford school for the folklore that the ‘classical communication’ in these protocols – although often implicit – should properly be thought of as 2-categorical structure. It is pleasing to be able to claim that the same applies to implicit communication in classical protocols!.
References
Abramsky, S.: Retracing some paths in process algebra. In: Montanari, U., Sassone, V. (eds.) CONCUR 1996. LNCS, vol. 1119, pp. 1–17. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-61604-7_44
Abramsky, S., Coecke, B.: A categorical semantics of quantum protocols. In: Proceedings of the 19th Annual IEEE Symposium on Logic in Computer Science (LICS 2004), pp. 415–425. IEEE Computer Society Press (2005)
Amoroso, E.: Fundamentals of Computer Security Technology. Prentice-Hall Inc, USA (1994)
Barwise, J., Gabbay, D., Hartonas, C.: On the logic of information flow. Logic J. IGPL 3(7), 7–49 (1998)
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theor. 22(6), 644–654 (1976)
Eades III, H., Jiang, J., Bryant, A.: On linear logic, functional programming, and attack trees. In: Cybenko, G., Pym, D., Fila, B. (eds.) GraMSec 2018. LNCS, vol. 11086, pp. 71–89. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-15465-3_5
Girard, J.-Y.: Geometry of interaction 1. In: Proceedings Logic Colloquium 1988, pp. 221–260. North-Holland (1988)
Hines, P.: A diagrammatic approach to information flow in encrypted communication (extended version). arxiv.org/abs/2008.05840 (2020)
Horne, R., Mauw, S., Tiu, A.: Semantics for specialising attack trees based on linear logic. Fundamenta Informaticae 153(1–2), 57–86 (2017)
Ivanova, M.G., Probst, C.W., Hansen, R.R., Kammüller, F.: Transforming graphical system models to graphical attack models. In: Mauw, S., Kordy, B., Jajodia, S. (eds.) GraMSec 2015. LNCS, vol. 9390, pp. 82–96. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-29968-6_6
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996). Discrete Mathematics and Its Applications
Merkle, R.: Secure communications over insecure channels. Commun. ACM 21(4), 294–299 (1978)
O’Halloran, C.: Category theory applied to information flow for computer security. PhD thesis, Oxford University Computing Laboratory (1994)
Pavlovic, D.: Chasing diagrams in cryptography. In: Casadio, C., Coecke, B., Moortgat, M., Scott, P. (eds.) Categories and Types in Logic. Language, and Physics: Essays Dedicated to Jim Lambek on the Occasion of His 90th Birthday, pp. 353–367. Springer, Berlin Heidelberg (2014)
Power, J.: 2-categories. Technical report NS-98-7, B.R.I.C.S., p. 18 (1998)
Schneier, B.: Attack trees: modeling security threats. Dr. Dobb’s J. Softw. Tools 24(12), 21–29 (1999)
Acknowledgements
I have had the good fortune to encounter several cryptographically-minded category theorists, and category-curious cryptographers. Thanks are due to Chris Heunen (Edinburgh), Delaram Kahrobaei (York), Dusko Pavlovic (Hawaii), and Noson Yanofsky (New York). Thanks are also due to Morgan Hines, for help in finding the regular polyhedra in three or more dimensions associated with the protocols in [8].
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Hines, P.M. (2020). A Diagrammatic Approach to Information Flow in Encrypted Communication. In: Eades III, H., Gadyatskaya, O. (eds) Graphical Models for Security. GraMSec 2020. Lecture Notes in Computer Science(), vol 12419. Springer, Cham. https://doi.org/10.1007/978-3-030-62230-5_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-62230-5_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-62229-9
Online ISBN: 978-3-030-62230-5
eBook Packages: Computer ScienceComputer Science (R0)