Skip to main content

Symbolic Semantics and Analysis for Crypto-CCS with (Almost) Generic Inference Systems

  • Conference paper
  • First Online:
Mathematical Foundations of Computer Science 2002 (MFCS 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2420))

Abstract

Crypto-CCS is a formal description language for distributed protocols which is suitable to abstractly model the cryptographic ones. Indeed, this language adopts a message-manipulating rule which may be used to mimic some features of cryptographic functions. We equip the Crypto-CCS calculus with a symbolic operational semantics. Moreover, we provide a mechanized method to analyze the security properties of cryptographic protocols (with finite behaviour), symbolically. Our work extends the previous one on symbolic verification techniques for cryptographic protocols modeled with process algebras since it deals with (almost) generic inference systems instead of fixed ones.

Work partially supported by Microsoft Research Europe (Cambridge); by MIUR project “MEFISTO”; by MIUR project “Tecniche e strumenti software per l’analisi della sicurezza delle comunicazioni in applicazioni telematiche di interesse economico e sociale”; by CNR project “Strumenti, ambienti ed applicazioni innovative per la società dell’informazione” and finally by CSP with the project “SeTAPS”.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1–70, 1999.

    Article  MATH  MathSciNet  Google Scholar 

  2. R. M. Amadio and D. Lugiez. On the reachability problem in cryptographic protocols. In Proc. of CONCUR, volume 1877 of LNCS, pages 380–394, 2000.

    Google Scholar 

  3. B. Blanchet. An efficient cryptographic protocol verifier based on prolog rules. In Proc. of CSFW, IEEE Press, pages 82–96, 2001.

    Google Scholar 

  4. M. Boreale. Symbolic trace analysis of cryptographic protocols. In Proc. of ICALP, LNCS, pages 667–681, 2001.

    Google Scholar 

  5. M. Fiore and M. Abadi. Computing symbolic models for verifying cryptographic protocols. In Proc. of CSFW, IEEE Press, pages 160–173, 2001.

    Google Scholar 

  6. R. Focardi and F. Martinelli. A uniform approach for the definition of security properties. In Proc. of FM’99, volume 1708 of LNCS, pages 794–813, 1999.

    Google Scholar 

  7. A. Ingólfsdóttir and H. Lin. A symbolic approach to value-passing processes. In J. Bergstra, A. Ponse, and S. Smolka, editors, Handbook of Process Algebra, pages 427–478. North-Holland, 2001.

    Google Scholar 

  8. D. Kindred and J. M. Wing. Fast, automatic checking of security protocols. In Proc. of Second USENIX Workshop on Electronic Commerce, pages 41–52, Oakland, California, 1996.

    Google Scholar 

  9. G. Leduc and F. Germeau. Verification of security protocols using LOTOS-method and application. Computer Communications, 23(12):1089–1103, 2000.

    Article  Google Scholar 

  10. G. Lowe. Breaking and fixing the Needham Schroeder public-key protocol using FDR. In Proc. of TACAS, volume 1055 of LNCS, pages 147–166, 1996.

    Google Scholar 

  11. F. Martinelli. Analysis of security protocols as open systems. Tech. Rep. IAT-B4-2001-06. To appear on TCS.

    Google Scholar 

  12. F. Martinelli. Encoding several authentication properties as properties of the intruder’s knowledge. Tech. Rep. IAT-B4-2001-20. Submitted for publication.

    Google Scholar 

  13. F. Martinelli. Formal Methods for the Analysis of Open Systems with Applications to Security Properties. PhD thesis, University of Siena, Dec. 1998.

    Google Scholar 

  14. F. Martinelli. Languages for description and analysis of authentication protocols. In Proc. of ICTCS, pages 304–315. World Scientific, 1998.

    Google Scholar 

  15. J. Millen and V. Shmatikov. Constraint solving for bounded-process cryptographic protocol analysis. In Proc. of CCS, ACM Press, 2001.

    Google Scholar 

  16. R. Milner. Communication and Concurrency. International Series in Computer Science. Prentice Hall, 1989.

    Google Scholar 

  17. Thayer, Herzog, and Guttman. Honest ideals on strand spaces. In Proc. of CSFW. IEEE Computer Society Press, 1998.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Martinelli, F. (2002). Symbolic Semantics and Analysis for Crypto-CCS with (Almost) Generic Inference Systems. In: Diks, K., Rytter, W. (eds) Mathematical Foundations of Computer Science 2002. MFCS 2002. Lecture Notes in Computer Science, vol 2420. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45687-2_43

Download citation

  • DOI: https://doi.org/10.1007/3-540-45687-2_43

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44040-6

  • Online ISBN: 978-3-540-45687-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics