Abstract
One of the many different approaches to proving properties of a cryptographic security protocol is to encode it within a process calculus [6],[7],[11],[12],[14],[20], and then to apply standard techniques from concurrency theory such as modelchecking [19] or equational reasoning [4],[5],[8],[9],[13],[15]. A promising recent development is to verify properties such as secrecy and authenticity via behavioural type systems [1],[2],[3],[10],[16],[17],[18]. This tutorial reviews the known type systems and results in this area, and suggests areas for further research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749–786, September 1999.
M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. In Foundations of Software Science and Computation Structures (FoSSaCS 2001), volume 2030 of Lecture Notes in Computer Science, pages 25–41. Springer, 2001.
M. Abadi and B. Blanchet. Analyzing security protocols with secrecy types and logic programs. In 29th ACM Symposium on Principles of Programming Languages (POPL’02), pages 33–44, 2002.
M. Abadi, C. Fournet, and G. Gonthier. Secure communications implementation of channel abstractions. In 13th IEEE Symposium on Logic in Computer Science (LICS’98), pages 105–116, 1998.
M. Abadi and A. D. Gordon. A bisimulation method for cryptographic protocols. Nordic Journal of Computing, 5:267–303, 1998.
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spicalculus. Information and Computation, 148:1–70, 1999.
R. Amadio and S. Prasad. The game of the name in cryptographic tables. In Advances in Computing Science (ASIAN’99), volume 1742 of Lecture Notes in Computer Science, pages 5–26. Springer, 1999.
M. Boreale, R. De Nicola, and R. Pugliese. Proof techniques for cryptographic processes. In 14th IEEE Symposium on Logic in Computer Science, pages 157–166, 1999.
B. Borgström and U. Nestmann. On bisimulations for the spi calculus. In International Conference on Algebraic Methodology And Software Technology (AMAST2002), Lecture Notes in Computer Science. Springer, 2002. To appear.
I. Cervesato. Typed MSR: Syntax and examples. In First International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security (MMM’01), volume 2052 of Lecture Notes in Computer Science, pages 159–177. Springer, 2001.
M. Dam. Proving trust in systems of second-order processes. In 31st Hawaii International Conference on System Sciences, volume VII, pages 255–264, 1998.
N. Durgin, J. C. Mitchell, and D. Pavlovic. A compositional logic for protocol correctness. In 14th IEEE Computer Security Foundations Workshop, pages 241–255. IEEE Computer Society Press, 2001.
A. S. Elkjær, M. Höhle, H. Hüttel, and K. Overgård. Towards automatic bisimilarity checking in the spi calculus. Australian Computer Science Communications, 21(3):175–189, 1999.
R. Focardi and R. Gorrieri. A classication of security properties for process algebra. Journal of Computer Security, 3(1):5–33, 1994.
R. Focardi, R. Gorrieri, and F. Martinelli. Message authentication through noninterference. In International Conference on Algebraic Methodology And Software Technology (AMAST2000), volume 1816 of Lecture Notes in Computer Science, pages 258–272. Springer, 2000.
A. D. Gordon and A. Jerey. Authenticity by typing for security protocols. In 14th IEEE Computer Security Foundations Workshop, pages 145–159. IEEE Computer Society Press, 2001.
A. D. Gordon and A. Jerey. Typing correspondence assertions for communication protocols. In Mathematical Foundations of Programming Semantics 17, volume 45 of Electronic Notes in Theoretical Computer Science. Elsevier, 2001. Pages 99–120 of the Preliminary Proceedings, BRICS Notes Series NS-01-2, BRICS, University of Aarhus, May 2001. Extended version to appear in Theoretical Computer Science.
A. D. Gordon and A. Jerey. Types and eects for asymmetric cryptographic protocols. In 15th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, 2002. To appear.
G. Lowe. Breaking and xing the Needham-Schroeder public-key protocol using CSP and FDR. In T. Margaria and B. Steen, editors, Tools and Algorithms for the Construction and Analysis of Systems (TACAS’96), volume 1055 of Lecture Notes in Computer Science, pages 147–166. Springer, 1996.
P. Ryan and S. Schneider. Modelling and Analysis of Security Protocols. Addison-Wesley, 2001.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gordon, A.D. (2002). Types for Cryptographic Protocols. In: Brim, L., Křetínský, M., Kučera, A., Jančar, P. (eds) CONCUR 2002 — Concurrency Theory. CONCUR 2002. Lecture Notes in Computer Science, vol 2421. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45694-5_7
Download citation
DOI: https://doi.org/10.1007/3-540-45694-5_7
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44043-7
Online ISBN: 978-3-540-45694-0
eBook Packages: Springer Book Archive