Abstract
We develop new proof techniques, based on non-interference, for the analysis of safety and liveness properties of cryptographic protocols expressed as terms of the process algebra CryptoSPA. Our approach draws on new notions of behavioral equivalence, built on top of a context-sensitive labelled transition system, that allow us to characterize the behavior of a process in the presence of any attacker with a given initial knowledge. We demonstrate the effectiveness of the approach with an example of a protocol of fair exchange.
This work has been partially supported by the MIUR project “Modelli formali per la sicurezza (MEFISTO)” and the EU project IST-2001-32617 “Models and types for security in mobile distributed systems (MyThS)”.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Abadi, M.: Security Protocols and Specifications. In: Thomas, W. (ed.) FOSSACS 1999. LNCS, vol. 1578, pp. 1–13. Springer, Heidelberg (1999)
Asokan, N., Shoup, V., Waidener, M.: Asynchronuous Protocols for Optimistic Fair Exchange. In: Proc. of the IEEE Symposium on Research in Security and Privacy, pp. 86–99. IEEE Computer Society Press, Los Alamitos (1998)
Boreale, M., Buscemi, M.G.: A Framework for the Analysis of Security Protocols. In: Brim, L., Jančar, P., Křetínský, M., Kucera, A. (eds.) CONCUR 2002. LNCS, vol. 2421, pp. 483–498. Springer, Heidelberg (2002)
Boreale, M., De Nicola, R., Pugliese, R.: Proof Tecniques for Cryptographic Processes. In: Proc. of the 14th IEEE Symposium on Logic in Computer Science (LICS 1999), pp. 157–166. IEEE Computer Society Press, Los Alamitos (1999)
Boreale, M., Gorla, D.: On Compositional Reasoning in the spi-calculus. In: Nielsen, M., Engberg, U. (eds.) FOSSACS 2002. LNCS, vol. 2303, pp. 67–81. Springer, Heidelberg (2002)
Bossi, A., Focardi, R., Piazza, C., Rossi, S.: A Proof System for Information Flow Security. In: Leuschel, M. (ed.) Proc. of Int. Workshop on Logic Based Program Development and Transformation. LNCS, Springer, Heidelberg (2002) (to appear)
Ceccato, A.: Analisi di protocolli crittografici in contesti ostili. Laurea thesis, Universita Ca Foscari di Venezia (2001)
Focardi, R., Gorrieri, R.: Classification of Security Properties (Part I: Information Flow). In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, p. 331. Springer, Heidelberg (2001)
Focardi, R., Gorrieri, R., Martinelli, F.: Non Interference for the Analysis of Cryptographic Protocols. In: Welzl, E., Montanari, U., Rolim, J.D.P. (eds.) ICALP 2000. LNCS, vol. 1853, pp. 744–755. Springer, Heidelberg (2000)
Focardi, R., Rossi, S.: Information Flow Security in Dynamic Contexts. In: Proc. Of the 15th IEEE Computer Security Foundations Workshop, pp. 307–319. IEEE Computer Society Press, Los Alamitos (2002)
Gorrieri, R., Locatelli, E., Martinelli, F.: A Simple Language for Real-time Cryptographic Protocol Analysis. In: Proc. of 12th European Symposium on Programming Languages and Systems. LNCS, Springer, Heidelberg (2003) (to appear)
Mantel, H.: Unwinding Possibilistic Security Properties. In: Proc. of the European Symposium on Research in Computer Security. LNCS, vol. 2895, pp. 238–254. Springer, Heidelberg (2000)
Milner, R.: Communication and Concurrency. Prentice-Hall, Englewood Cliffs (1989)
Shmatikov, V., Mitchell, J.C.: Analysis of a Fair Exchange Protocol. In: Proc. of 7th Annual Symposium on Network and Distributed System Security (NDSS 2000), pp. 119–128. Internet Society, San Diego (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bugliesi, M., Ceccato, A., Rossi, S. (2003). Context-Sensitive Equivalences for Non-interference Based Protocol Analysis. In: Lingas, A., Nilsson, B.J. (eds) Fundamentals of Computation Theory. FCT 2003. Lecture Notes in Computer Science, vol 2751. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45077-1_34
Download citation
DOI: https://doi.org/10.1007/978-3-540-45077-1_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40543-6
Online ISBN: 978-3-540-45077-1
eBook Packages: Springer Book Archive