Skip to main content

Modeling for Security Verification of a Cryptographic Protocol with MAC Payload

  • Conference paper
Book cover Advances in Intelligent Computing (ICIC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3645))

Included in the following conference series:

Abstract

We propose a new sub-term relation to specify syntax of messages with MAC (Message Authentication Code) payload for the cryptographic protocols in the strand space model. The sub-term relation was introduced to formal analysis of cryptographic protocols based on theorem proving, but some defects have been found in it. In the present paper, first, the operatorf is defined to the extend sub-term relation, which is used to amend its original flaws. Second, a new ideal is constructed, and is used to expand the bounds on the penetrator’s abilities. Third, the decidable theorem for honesty of ideals holds as it is described under the extended sub-term relation is proved. Fourth, we propose the theorem of the satisfiability for decidable conditions of honest ideals and annotate how invariant-sets generate, which is used to verify security properties of cryptographic protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. Proceedings of the Royal Society, Series A 426(1871), 233–271 (1989), Also appeared as SRC Research Report 39 and, in a shortened form. ACM Transactions on Computer Systems 8(1), 18–36 (1990)

    Google Scholar 

  2. Kindred, D.: Theory Generation for Security Protocols [Ph.D. Thesis]. Pittsburgh: Department of Computer Science, Carnegie Mellon University (1999)

    Google Scholar 

  3. Lowe, G.: Breaking and Fixing the Needham-Schroeder Public-key Protocol Using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147–166. Springer, Heidelberg (1996)

    Google Scholar 

  4. Millen, J.: The Interrogator Model. In: Proceedings of the 1995 IEEE Symposium on Security and Privacy, pp. 251–260. IEEE Computer Society Press, Los Alamitos (1995)

    Chapter  Google Scholar 

  5. Meadows, C.: The NRL Protocol Analyzer: An Overview. Journal of Logic Programming 26(2), 113–131 (1996)

    Article  MATH  Google Scholar 

  6. Paulson, L.C.: Proving Properties of Security Protocols by Induction. In: 10th IEEE Computer Security Foundations Workshop, pp. 70–83. IEEE Computer Society Press, Los Alamitos (1997)

    Chapter  Google Scholar 

  7. Javier Thayer Fábrega, F., Herzog, J.C., Guttman, J.D.: Strand Spaces: Proving Security Protocols Correct. Journal of Computer Security 7(2-3), 191–230 (1999)

    Google Scholar 

  8. Abadi, M., Gordon, A.D.: A Calculus for Cryptographic Protocols: The Spi Calculus. Information and Computation 148, 1–70 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  9. Gordon, A., Jeffrey, A.: Authenticity by Typing in Security Protocols. In: 14th IEEE Computer Security Foundations Workshop, pp. 145–159. IEEE Computer Society Press, Los Alamitos (2001)

    Chapter  Google Scholar 

  10. Gordon, A., Jeffrey, A.: Typing Correspondence Assertions for Communication Protocols. In: Mathematical Foundations of Programming Semantics 17. Electronic Notes in Theoretical Computer Science, vol. 45. Elsevier, Amsterdam (2001)

    Google Scholar 

  11. Abadi, M.: Secrecy by Typing in Security Protocols. Journal of the ACM 46(5), 749–786 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  12. Abadi, M., Blanchet, B.: Secrecy Types for Asymmetric Communication. In: Honsell, F., Miculan, M. (eds.) FOSSACS 2001. LNCS, vol. 2030, pp. 25–41. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  13. Huai, J., Li, X.: Algebraic Model and Security of Cryptographic Protocols. Science in China (Ser. E) 33(12), 1087–1106 (2003)

    Google Scholar 

  14. Harkins, D., Carrel, D.: The Internet Key Exchange (IKE), RFC2409 (1998), Available at http://www.faqs.org/rfcs/rfcs2409.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, H., Zhang, Y., Li, Y. (2005). Modeling for Security Verification of a Cryptographic Protocol with MAC Payload. In: Huang, DS., Zhang, XP., Huang, GB. (eds) Advances in Intelligent Computing. ICIC 2005. Lecture Notes in Computer Science, vol 3645. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11538356_56

Download citation

  • DOI: https://doi.org/10.1007/11538356_56

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28227-3

  • Online ISBN: 978-3-540-31907-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics