Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy
DOI: 10.1109/risp.1994.296586
|View full text |Cite
|
Sign up to set email alerts
|

Generating formal cryptographic protocol specifications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(17 citation statements)
references
References 29 publications
0
17
0
Order By: Relevance
“…Using DES as cryptographic algorithm a shared secret key is used for authentication of messages ( [BGJY98]). A possible protocol written in a commonly used standard notation for cryptographic protocols ( [Car94])is: 1. to → from : {REQ,pdAuth(to)} K S 2. from → to : {VAL,pdAuth(from)} K S 3. to → from : {ACK,pdAuth(to)} K S In this protocol K S : key denotes a secret key shared between all valid Mondex cards. REQ, VAL and ACK are pairwise distinct constants used to distinguish the three message types.…”
Section: A Security Model For Mondex Pursesmentioning
confidence: 99%
“…Using DES as cryptographic algorithm a shared secret key is used for authentication of messages ( [BGJY98]). A possible protocol written in a commonly used standard notation for cryptographic protocols ( [Car94])is: 1. to → from : {REQ,pdAuth(to)} K S 2. from → to : {VAL,pdAuth(from)} K S 3. to → from : {ACK,pdAuth(to)} K S In this protocol K S : key denotes a secret key shared between all valid Mondex cards. REQ, VAL and ACK are pairwise distinct constants used to distinguish the three message types.…”
Section: A Security Model For Mondex Pursesmentioning
confidence: 99%
“…We built Java implementations of these protocols automatically generating them with the AnBx compiler [11,12]. On both the original and revised versions we used the same cryptographic primitives and settings 7 . The results of the original and revised versions are usually similar, though the original 3KP and signed SET run slightly faster.…”
Section: Experimental Setup and Performancementioning
confidence: 99%
“…In such frameworks, the semantics of the specification languages is defined by a translation into lower level formats, amenable to model-checking and automated verification. Besides making verification possible, the translation semantics provides for a clean separation between the abstract specification of the protocol structure and the details of its implementation, which may be generated directly from the specification [6,7,8,9,10,11,12]. This propose the definition and implementation of different channel abstractions, based on cryptographic realizations and interaction patterns.…”
Section: Introductionmentioning
confidence: 99%
“…Our protocol for the Mondex value transfer, written in a commonly used standard notation for cryptographic protocols [Car94], is:…”
Section: A Protocol With Symmetric Encryptionmentioning
confidence: 99%