Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us
Search
Cart
Book cover

European Symposium on Research in Computer Security

ESORICS 2007: Computer Security – ESORICS 2007 pp 406–421Cite as

  1. Home
  2. Computer Security – ESORICS 2007
  3. Conference paper
Synthesizing Secure Protocols

Synthesizing Secure Protocols

  • Véronique Cortier1,
  • Bogdan Warinschi2 &
  • Eugen Zălinescu1 
  • Conference paper
  • 1182 Accesses

  • 7 Citations

Part of the Lecture Notes in Computer Science book series (LNSC,volume 4734)

Abstract

We propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) into a protocol that is secure against a fully active adversary which interacts with an unbounded number of protocol sessions, and has absolute control over the network. The transformation works for arbitrary protocols with any number of participants, written with usual cryptographic primitives. Our transformation provably preserves a large class of security properties that contains secrecy and authenticity.

An important byproduct contribution of this paper is a modular protocol development paradigm where designers focus their effort on an extremely simple execution setting – security in more complex settings being ensured by our generic transformation. Conceptually, the transformation is very simple, and has a clean, well motivated design. Each message is tied to the session for which it is intended via digital signatures and on-the-fly generated session identifiers, and prevents replay attacks by encrypting the messages under the recipient’s public key.

Keywords

  • Security Property
  • Execution Trace
  • Protocol Session
  • Passive Adversary
  • Honest Agent

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

The work described in this paper has been supported in part by the European Commission through the IST Programme under Contract IST-2002-507932 ECRYPT, and by the French ACI Satin and the French ACI Jeunes Chercheurs JC9005. The information in this document reflects only the author’s views, is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability.

Download conference paper PDF

References

  1. Abadi, M., Fournet, C., Gonthier, G.: Secure implementation of channel abstractions. Inf. Comput. 174(1), 37–83 (2002)

    CrossRef  MATH  MathSciNet  Google Scholar 

  2. Bellare, M., Canetti, R., Krawczyk, H.: A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract). In: STOC 1998. Proceedings of the thirtieth annual ACM symposium on Theory of computing, pp. 419–428. ACM Press, New York (1998)

    CrossRef  Google Scholar 

  3. Blanchet, B., Podelski, A.: Verification of cryptographic protocols: Tagging enforces termination. In: Gordon, A.D. (ed.) ETAPS 2003 and FOSSACS 2003. LNCS, vol. 2620, Springer, Heidelberg (2003)

    CrossRef  Google Scholar 

  4. Comon-Lundh, H., Cortier, V.: New decidability results for fragments of first-order logic and application to cryptographic protocols. In: Nieuwenhuis, R. (ed.) RTA 2003. LNCS, vol. 2706, pp. 148–164. Springer, Heidelberg (2003)

    CrossRef  Google Scholar 

  5. Cortier, V., Hördegen, H., Warinschi, B.: Explicit Randomness is not Necessary when Modeling Probabilistic Encryption. In: ICS 2006. Workshop on Information and Computer Security, Timisoara, Romania (September 2006)

    Google Scholar 

  6. Cortier, V., Warinschi, B.: Computationally Sound, Automated Proofs for Security Protocols. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 157–171. Springer, Heidelberg (2005)

    Google Scholar 

  7. Cortier, V., Warinschi, B., Zălinescu, E.: Synthesizing secure protocols. Inria research report, INRIA (April 2007), available at http://www.loria.fr/~cortier/Papiers/compiler.pdf

  8. Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: A derivation system and compositional logic for security protocols. J. Comput. Secur. 13(3), 423–482 (2005)

    Google Scholar 

  9. Durgin, N., Lincoln, P., Mitchell, J., Scedrov, A.: Undecidability of bounded security protocols. In: Proc. of the Workshop on Formal Methods and Security Protocols (1999)

    Google Scholar 

  10. Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: STOC 1987. Proceedings of the nineteenth annual ACM conference on Theory of computing, pp. 218–229. ACM Press, New York (1987)

    CrossRef  Google Scholar 

  11. Gong, L., Syverson, P.: Fail-stop protocols: An approach to designing secure protocols. In: DCCA-5. Proceedings of the 5th International Working Conference on Dependable Computing for Critical Applications, pp. 44–55 (1995)

    Google Scholar 

  12. Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110–125. Springer, Heidelberg (2003)

    Google Scholar 

  13. Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147–166. Springer, Heidelberg (1996)

    Google Scholar 

  14. Lowe, G.: A hierarchy of authentication specifications. In: CSFW 1997, Rockport, Massachusetts, USA, IEEE Computer Society Press, Los Alamitos (1997)

    Google Scholar 

  15. Lowe, G.: Towards a completeness result for model checking of security protocols. In: CSFW 1998, IEEE Computer Society Press, Los Alamitos (1998)

    Google Scholar 

  16. Ramanujam, R., Suresh, S.P.: A decidable subclass of unbounded security protocols. In: WITS 2003. Proc. IFIP Workshop on Issues in the Theory of Security, Warsaw (Poland), pp. 11–20 (2003)

    Google Scholar 

  17. Rusinowitch, M., Turuani, M.: Protocol insecurity with finite number of sessions is NP-complete. In: CSFW 2001, pp. 174–190. IEEE Computer Society Press, Los Alamitos (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Loria UMR 7503 & CNRS & INRIA Lorraine, Project Cassis,  

    Véronique Cortier & Eugen Zălinescu

  2. Computer Science Department, University of Bristol,  

    Bogdan Warinschi

Authors
  1. Véronique Cortier
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Bogdan Warinschi
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Eugen Zălinescu
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

    Rights and permissions

    Reprints and Permissions

    Copyright information

    © 2007 Springer-Verlag Berlin Heidelberg

    About this paper

    Cite this paper

    Cortier, V., Warinschi, B., Zălinescu, E. (2007). Synthesizing Secure Protocols. In: Biskup, J., López, J. (eds) Computer Security – ESORICS 2007. ESORICS 2007. Lecture Notes in Computer Science, vol 4734. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74835-9_27

    Download citation

    • .RIS
    • .ENW
    • .BIB
    • DOI: https://doi.org/10.1007/978-3-540-74835-9_27

    • Publisher Name: Springer, Berlin, Heidelberg

    • Print ISBN: 978-3-540-74834-2

    • Online ISBN: 978-3-540-74835-9

    • eBook Packages: Computer ScienceComputer Science (R0)

    Share this paper

    Anyone you share the following link with will be able to read this content:

    Sorry, a shareable link is not currently available for this article.

    Provided by the Springer Nature SharedIt content-sharing initiative

    Search

    Navigation

    • Find a journal
    • Publish with us

    Discover content

    • Journals A-Z
    • Books A-Z

    Publish with us

    • Publish your research
    • Open access publishing

    Products and services

    • Our products
    • Librarians
    • Societies
    • Partners and advertisers

    Our imprints

    • Springer
    • Nature Portfolio
    • BMC
    • Palgrave Macmillan
    • Apress
    • Your US state privacy rights
    • Accessibility statement
    • Terms and conditions
    • Privacy policy
    • Help and support

    167.114.118.212

    Not affiliated

    Springer Nature

    © 2023 Springer Nature