Abstract
Crypto-CCS is a formal description language for distributed protocols which is suitable to abstractly model the cryptographic ones. Indeed, this language adopts a message-manipulating rule which may be used to mimic some features of cryptographic functions. We equip the Crypto-CCS calculus with a symbolic operational semantics. Moreover, we provide a mechanized method to analyze the security properties of cryptographic protocols (with finite behaviour), symbolically. Our work extends the previous one on symbolic verification techniques for cryptographic protocols modeled with process algebras since it deals with (almost) generic inference systems instead of fixed ones.
Work partially supported by Microsoft Research Europe (Cambridge); by MIUR project “MEFISTO”; by MIUR project “Tecniche e strumenti software per l’analisi della sicurezza delle comunicazioni in applicazioni telematiche di interesse economico e sociale”; by CNR project “Strumenti, ambienti ed applicazioni innovative per la società dell’informazione” and finally by CSP with the project “SeTAPS”.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1–70, 1999.
R. M. Amadio and D. Lugiez. On the reachability problem in cryptographic protocols. In Proc. of CONCUR, volume 1877 of LNCS, pages 380–394, 2000.
B. Blanchet. An efficient cryptographic protocol verifier based on prolog rules. In Proc. of CSFW, IEEE Press, pages 82–96, 2001.
M. Boreale. Symbolic trace analysis of cryptographic protocols. In Proc. of ICALP, LNCS, pages 667–681, 2001.
M. Fiore and M. Abadi. Computing symbolic models for verifying cryptographic protocols. In Proc. of CSFW, IEEE Press, pages 160–173, 2001.
R. Focardi and F. Martinelli. A uniform approach for the definition of security properties. In Proc. of FM’99, volume 1708 of LNCS, pages 794–813, 1999.
A. Ingólfsdóttir and H. Lin. A symbolic approach to value-passing processes. In J. Bergstra, A. Ponse, and S. Smolka, editors, Handbook of Process Algebra, pages 427–478. North-Holland, 2001.
D. Kindred and J. M. Wing. Fast, automatic checking of security protocols. In Proc. of Second USENIX Workshop on Electronic Commerce, pages 41–52, Oakland, California, 1996.
G. Leduc and F. Germeau. Verification of security protocols using LOTOS-method and application. Computer Communications, 23(12):1089–1103, 2000.
G. Lowe. Breaking and fixing the Needham Schroeder public-key protocol using FDR. In Proc. of TACAS, volume 1055 of LNCS, pages 147–166, 1996.
F. Martinelli. Analysis of security protocols as open systems. Tech. Rep. IAT-B4-2001-06. To appear on TCS.
F. Martinelli. Encoding several authentication properties as properties of the intruder’s knowledge. Tech. Rep. IAT-B4-2001-20. Submitted for publication.
F. Martinelli. Formal Methods for the Analysis of Open Systems with Applications to Security Properties. PhD thesis, University of Siena, Dec. 1998.
F. Martinelli. Languages for description and analysis of authentication protocols. In Proc. of ICTCS, pages 304–315. World Scientific, 1998.
J. Millen and V. Shmatikov. Constraint solving for bounded-process cryptographic protocol analysis. In Proc. of CCS, ACM Press, 2001.
R. Milner. Communication and Concurrency. International Series in Computer Science. Prentice Hall, 1989.
Thayer, Herzog, and Guttman. Honest ideals on strand spaces. In Proc. of CSFW. IEEE Computer Society Press, 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Martinelli, F. (2002). Symbolic Semantics and Analysis for Crypto-CCS with (Almost) Generic Inference Systems. In: Diks, K., Rytter, W. (eds) Mathematical Foundations of Computer Science 2002. MFCS 2002. Lecture Notes in Computer Science, vol 2420. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45687-2_43
Download citation
DOI: https://doi.org/10.1007/3-540-45687-2_43
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44040-6
Online ISBN: 978-3-540-45687-2
eBook Packages: Springer Book Archive