2006
DOI: 10.21236/ada462541
|View full text |Cite
|
Sign up to set email alerts
|

Deriving Key Distribution Protocols and their Security Properties

Abstract: We apply the derivational method of protocol verification to key distribution protocols. This method assembles the security properties of a protocol by composing the guarantees offered by embedded fragments and patterns. It has shed light on fundamental notions such as challenge-response and fed a growing taxonomy of protocols. Here, we similarly capture the essence of key distribution, authentication timestamps and key confirmation. With these building blocks, we derive the authentication properties of the Ne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 20 publications
(40 reference statements)
0
6
0
Order By: Relevance
“…Subject authentication [16] ensures one party's confidence by providing evidence and/or credentials of the identity of the second party participating in the protocol, verifying that the second party indeed participated during the current protocol run. Message authentication [17], [18] requires the protocol to provide means to ensure that the received message or data segment was created by a specific party at some (usually unspecified) point in the past and that this data has not been tampered with or forged.…”
Section: Protocol Security Propertiesmentioning
confidence: 99%
“…Subject authentication [16] ensures one party's confidence by providing evidence and/or credentials of the identity of the second party participating in the protocol, verifying that the second party indeed participated during the current protocol run. Message authentication [17], [18] requires the protocol to provide means to ensure that the received message or data segment was created by a specific party at some (usually unspecified) point in the past and that this data has not been tampered with or forged.…”
Section: Protocol Security Propertiesmentioning
confidence: 99%
“…The interested reader will find further details, as well as a semantics of protocol execution, in [4].…”
Section: Specifying Protocolsmentioning
confidence: 99%
“…An observation Q A is similarly mapped to a formula Φ A . Dually, an arbitrary formula Φ can be validated against a run Q, realizing a form of model checking [4].…”
Section: Reasoning About Authenticationmentioning
confidence: 99%
See 2 more Smart Citations