首页> 外文会议>Foundations of software science and computational structures >Cryptographic Protocol Composition via the Authentication Tests
【24h】

Cryptographic Protocol Composition via the Authentication Tests

机译:通过身份验证测试的加密协议组成

获取原文
获取原文并翻译 | 示例

摘要

Although cryptographic protocols are typically analyzed in isolation, they are used in combinations. If a protocol ∏_1, when analyzed alone, was shown to meet some security goals, will it still meet those goals when executed together with a second protocol ∏_2? Not necessarily: for every ∏_1, some ∏_2 undermine its goals. We use the strand space "authentication test" principles to suggest a criterion to ensure a ∏_2 preserves ∏_1's goals; this criterion strengthens previous proposals.rnSecurity goals for ∏_1 are expressed in a language L(∏_1) in classical logic. Strand spaces provide the models for L(∏_1). Certain homo morphisms among models for L(∏) preserve the truth of the security goals. This gives a way to extract-from a counterexample to a goal that uses both protocols-a counterexample using only the first protocol. This model-theoretic technique, using homomorphisms among models to prove results about a syntactically defined set of formulas, appears to be novel for protocol analysis.
机译:尽管通常对加密协议进行隔离分析,但它们可以组合使用。如果单独对协议∏_1进行分析时,它被证明满足某些安全目标,那么与第二个协议∏_2一起执行时,它仍将达到那些目标吗?不一定:对于每个∏_1,有些∏_2都会破坏其目标。我们使用链空间“身份验证测试”原理来建议一个标准,以确保∏_2保留∏_1的目标; criterion_1的安全性目标用古典逻辑中的语言L(∏_1)表示。链空间提供了L(∏_1)的模型。 L(∏)模型之间的某些同态射影保留了安全目标的真相。这提供了一种从反例中提取使用两个协议的目标的方法,而仅使用第一个协议的反例。这种模型理论技术,利用模型之间的同态性来证明关于句法定义的一组公式的结果,对于协议分析而言似乎是新颖的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号