Skip to main content

On Evaluating the Performance of Security Protocols

  • Conference paper
Book cover Parallel Computing Technologies (PaCT 2005)

Abstract

We use an enhanced operational semantics to infer quantitative measures on systems describing cryptographic protocols. System transitions carry enhanced labels. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of possibly different crypto-systems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools.

Supported in part by the EU IST-2001-32072 project DEGAS.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols - The Spi calculus. Information and Computation 148(1), 1–70 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  2. Allen, A.A.: Probability, Statistics and Queueing Theory with Computer Science Applications. Academic Press, London (1978)

    MATH  Google Scholar 

  3. Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Riis Nielson, H.: Automatic validation of protocol narration. In: Proc. of CSFW 2003, pp. 126–140. IEEE, Los Alamitos (2003)

    Google Scholar 

  4. Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Riis Nielson, H.: Control Flow Analysis can find new flaws too. In: Proc. of Workshop on Issues in the Theory of Security (WITS 2004) (2004)

    Google Scholar 

  5. Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Riis Nielson, H.: Static validation of security protocos. To appear in Journal of Computer Securuty

    Google Scholar 

  6. Bodei, C., Buchholtz, M., Curti, M., Degano, P., Nielson, F., Riis Nielson, H., Priami, C.: Performance Evaluation of Security Protocols specified in Lysa. In: Proc. of (QAPL 2004). ENTCS, vol. 112 (2005)

    Google Scholar 

  7. Bodei, C., Curti, M., Degano, P., Priami, C.: A Quantitative Study of Two Attacks. In: Proc. of (WISP 2004). ENTCS, vol. 121 (2005)

    Google Scholar 

  8. Bravetti, M., Bernardo, M., Gorrieri, R.: Towards Performance Evaluation with General Distributions in Process Algebras. In: Sangiorgi, D., de Simone, R. (eds.) CONCUR 1998. LNCS, vol. 1466, pp. 405–422. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  9. Buchholtz, M., Nielson, F., Riis Nielson, H.: A calculus for control flow analysis of security protocols. International Journal of Information Security 2(3-4) (2004)

    Google Scholar 

  10. Cervesato Fine-Grained, I.: MSR Specifications for Quantitative Security Analysis. In: Proc. of WITS 2004, pp. 111–127 (2004)

    Google Scholar 

  11. Clark, G.: Formalising the specifications of rewards with PEPA. In: Proc. of PAPM 1996, pp. 136–160. CLUT, Torino (1996)

    Google Scholar 

  12. Daemen, J., Rijndael, V.: The design of Rijndael. Springer, Heidelberg (2002)

    MATH  Google Scholar 

  13. Degano, P., Priami, C.: Non Interleaving Semantics for Mobile Processes. Theoretical Computer Science 216, 237–270 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  14. Degano, P., Priami, C.: Enhanced Operational Semantics. ACM Computing Surveys 33(2), 135–176 (2001)

    Article  MathSciNet  Google Scholar 

  15. Diffie, W., Hellman, M.E.: New directions in Cryptography. IEEE Transactions on Information Theory IT-22(6), 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  16. Dolev, D., Yao, A.: On the security of public key protocols. IEEE TIT IT-29(12), 198–208 (1983)

    MathSciNet  Google Scholar 

  17. IEEE P1363 Standard Specification for Public-Key Cryptography (1999)

    Google Scholar 

  18. Hermanns, H., Herzog, U., Mertsiotakis, V.: Stochastic process algebras – between LOTOS and Markov Chains. Computer Networks and ISDN systems 30(9-10), 901–924 (1998)

    Article  Google Scholar 

  19. Hillston, J.: A Compositional Approach to Performance Modelling. Cambridge University Press, Cambridge (1996)

    Book  Google Scholar 

  20. Hodjat, A., Verbauwhede, I.: The Energy Cost of Secrets in Ad-hoc Networks. In: IEEE Circuits and Systems Workshop on Wireless Communications and Networking (2002)

    Google Scholar 

  21. Howard, R.: Dynamic Probabilistic Systems: Semi-Markov and Decision Systems, vol. II. Wiley, Chichester (1971)

    MATH  Google Scholar 

  22. Kohl, J.T., Clifford, B.C.: The Kerberos network authentication service (V5). The Internet Society (September 1993); RCF 1510

    Google Scholar 

  23. Meadows, C.: A cost-based framework for analysis of denial of service in networks. Journal of Computer Security 9(1/2), 143–164 (2001)

    Google Scholar 

  24. Milner, R., Parrow, J., Walker, D.: A calculus of mobile processes (I and II). Info. & Co. 100(1), 1–77 (1992)

    Article  MATH  MathSciNet  Google Scholar 

  25. Nelson, R.: Probability, Stochastic Processes and Queeing Theory. Springer, Heidelberg (1995)

    Google Scholar 

  26. Nottegar, C., Priami, C., Degano, P.: Performance Evaluation of Mobile Processes via Abstract Machines. Transactions on Software Engineering 27(10) (2001)

    Google Scholar 

  27. Otway, D., Rees, O.: Efficient and timely mutual authentication. ACM Operating Systems Review 21(1), 8–10 (1987)

    Article  Google Scholar 

  28. Perrig, A., Song, D.: A First Step towards the Automatic Generation of Security Protocols. In: Proc. of Network and Distributed System Security Symposium (2000)

    Google Scholar 

  29. Plotkin, G.: A Structural Approach to Operational Semantics. Tech. Rep. Aarhus University, Denmark (1981); DAIMI FN-19

    Google Scholar 

  30. Priami, C.: Language-based Performance Prediction of Distributed and Mobile Systems. Information and Computation 175, 119–145 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  31. Reibnam, A., Smith, R., Trivedi, K.: Markov and Markov reward model transient analysis: an overview of numerical approaches. European Journal of Operations Research 40, 257–267 (1989)

    Article  Google Scholar 

  32. Stewart, W.J.: Introduction to the numerical solutions of Markov chains. Princeton University Press, Princeton (1994)

    Google Scholar 

  33. Trivedi, K.S.: Probability and Statistics with Reliability, Queeing and Computer Science Applications, Edgewood Cliffs, NY (1982)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bodei, C. et al. (2005). On Evaluating the Performance of Security Protocols. In: Malyshkin, V. (eds) Parallel Computing Technologies. PaCT 2005. Lecture Notes in Computer Science, vol 3606. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11535294_1

Download citation

  • DOI: https://doi.org/10.1007/11535294_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28126-9

  • Online ISBN: 978-3-540-31826-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics