Abstract
Specifications for security protocols range from informal narrations of message flows to formal assertions of protocol properties. This paper (intended to accompany a lecture at ETAPS ’99) discusses those specifications and suggests some gaps and some opportunities for further work. Some of them pertain to the traditional core of the field; others appear when we examine the context in which protocols operate.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Martín Abadi. Secrecy by typing in security protocols. In Theoretical Aspects of Computer Software, volume 1281 of Lecture Notes in Computer Science, pages 611–638. Springer-Verlag, 1997.
Martín Abadi. Protection in programming-language translations. In Proceedings of the 25th International Colloquium on Automata, Languages and Programming, pages 868–883, July 1998. Also Digital Equipment Corporation Systems Research Center report No. 154, April 1998.
Martín Abadi. Two facets of authentication. In Proceedings of the 11th IEEE Computer Security Foundations Workshop, pages 27–32, 1998.
Martín Abadi, Andrew Birrell, Raymie Stata, and Edward Wobber. Secure web tunneling. Computer Networks and ISDN Systems, 30(1-7):531–539, April 1998. Proceedings of the 7th International World Wide Web Conference.
Martín Abadi, Cédric Fournet, and Georges Gonthier. Secure implementation of channel abstractions. In Proceedings of the Thirteenth Annual IEEE Symposium on Logic in Computer Science, pages 105–116, June 1998.
Martín Abadi and Andrew D. Gordon. A calculus for cryptographic protocols: The spi calculus. Technical Report 414, University of Cambridge Computer Laboratory, January 1997. A revised version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998, and an abridged version will appear in Information and Computation.
Martín Abadi and Roger Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6–15, January 1996.
Bowen Alpern and Fred B. Schneider. Defining liveness. Information Processing Letters, 21(4):181–185, October 1985.
Ross Anderson and Roger Needham. Robustness principles for public key protocols. In Proceedings of Crypto’ 95, pages 236–247, 1995.
Mihir Bellare, Ran Canetti, and Hugo Krawczyk. A modular approach to the design and analysis of authentication and key exchange protocols. In Proceedings of the 30th Annual ACM Symposium on Theory of Computing, pages 419–428, May 1998.
Mihir Bellare and Phillip Rogaway. Entity authentication and key distribution. In Advances in Cryptology-CRYPTO’ 93, volume 773 of Lecture Notes in Computer Science, pages 232–249. Springer Verlag, August 1993.
Andrew D. Birrell. Secure communication using remote procedure calls. ACM Transactions on Computer Systems, 3(1):1–14, February 1985.
Daniel Bleichenbacher. Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. In Advances in Cryptology-CRYPTO’98, volume 1462 of Lecture Notes in Computer Science, pages 1–12. Springer-Verlag, 1998.
Chiara Bodei, Pierpaolo Degano, Flemming Nielson, and Hanne Riis Nielson. Control flow analysis for the π-calculus. In CONCUR’98: Concurrency Theory, volume 1466 of Lecture Notes in Computer Science, pages 84–98. Springer Verlag, September 1998.
Michele Boreale and Rocco De Nicola. Testing equivalence for mobile processes. Information and Computation, 120(2):279–303, August 1995.
Michael Burrows, Martín Abadi, and Roger Needham. A logic of authentication. Proceedings of the Royal Society of London A, 426:233–271, 1989. A preliminary version appeared as Digital Equipment Corporation Systems Research Center report No. 39, February 1989.
L. Cardelli and A. D. Gordon. Mobile ambients. In Foundations of Software Science and Computation Structures, First International Conference (FoSSaCS’ 98), volume 1378 of Lecture Notes in Computer Science, pages 140–155. Springer Verlag, 1998.
CCITT. Blue Book (Recommendation X.509 and ISO 9594-8: The directoryauthentication framework). CCITT, 1988.
Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, and Hugo Krawczyk. Design and implementation of modular key management protocol and IPsecure tunnel on AIX. In Proceedings of the 5th USENIX UNIX Security Symposium, pages 41–54, June 1995.
William Cheswick and Steven Bellovin. Firewalls and Internet Security. Addison-Wesley, 1994.
Rocco De Nicola and Matthew C. B. Hennessy. Testing equivalences for processes. Theoretical Computer Science, 34:83–133, 1984.
Dorothy E. Denning. Cryptography and Data Security. Addison-Wesley, Reading, Mass., 1982.
Dorothy E. Denning and Giovanni Maria Sacco. Timestamps in key distribution protocols. Communications of the ACM, 24(7):533–535, August 1981.
Whitfield Diffie, Paul C. van Oorschot, and Michael J. Wiener. Authentication and authenticated key exchanges. Designs, Codes and Cryptography, 2:107–125, 1992.
Danny Dolev, Cynthia Dwork, and Moni Naor. Non-malleable cryptography. In ACM, editor, Proceedings of the Twenty Third Annual ACM Symposium on Theory of Computing, pages 542–552, 1991.
Danny Dolev and Andrew C. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29 (12):198–208, March 1983.
Alan O. Freier, Philip Karlton, and Paul C. Kocher. The SSL protocol: Version 3.0. Available at http://home.netscape.com/eng/ssl3/ssl-toc.html, March 1996.
Morrie Gasser. Building a Secure Computer System. Van Nostrand Reinhold Company Inc., New York, 1988.
Morrie Gasser and Ellen McDermott. An architecture for practical delegation in a distributed system. In Proceedings of the 1990 IEEE Symposium on Security and Privacy, pages 20–30, May 1990.
Dieter Gollman. What do we mean by entity authentication? In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 46–54, May 1996.
James W. Gray III and John McLean. Using temporal logic to specify and verify cryptographic protocols (progress report). In Proceedings of the 8th IEEE Computer Security Foundations Workshop, pages 108–116, 1995.
D. Harkins and D. Carrel. RFC 2409: The Internet Key Exchange (IKE). Available at ftp://ftp.isi.edu/in-notes/rfc2409.txt, November 1998.
Nevin Heintze and Jon G. Riecke. The SLam calculus: programming with secrecy and integrity. In Proceedings of the 25th ACM Symposium on Principles of Programming Languages, pages 365–377, 1998.
John Kelsey, Bruce Schneier, and David Wagner. Protocol interactions and the chosen protocol attack. In Security Protocols: 5th International Workshop, volume 1361 of Lecture Notes in Computer Science, pages 91–104. Springer Verlag, 1997.
Richard A. Kemmerer. Analyzing encryption protocols using formal verification techniques. IEEE Journal on Selected Areas in Communications, 7(4):448–457, May 1989.
Leslie Lamport. A simple approach to specifying concurrent systems. Communications of the ACM, 32(1):32–45, January 1989.
Butler Lampson, Martín Abadi, Michael Burrows, and Edward Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265–310, November 1992.
P. Lincoln, J. Mitchell, M. Mitchell, and A. Scedrov. A probabilistic poly-time framework for protocol analysis. In Proceedings of the Fifth ACM Conference on Computer and Communications Security, pages 112–121, 1998.
John Linn. Generic interface to security services. Computer Communications, 17(7):476–482, July 1994.
Jonn Linn. RFC 1508: Generic security service application program interface. Web page at ftp://ds.internic.net/rfc/rfc1508.txt, September 1993.
Gavin Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems, volume 1055 of Lecture Notes in Computer Science, pages 147–166. Springer Verlag, 1996.
Gavin Lowe. A hierarchy of authentication specifications. In Proceedings of the 10th IEEE Computer Security Foundations Workshop, pages 31–43, 1997.
Michael Luby. Pseudorandomness and Cryptographic Applications. Princeton University Press, 1996.
John McLean. Security models. In John Marciniak, editor, Encyclopedia of Software Engineering. Wiley & Sons, 1994.
John McLean. A general theory of composition for a class of “possibilistic” properties. IEEE Transactions on Software Engineering, 22(1):53–66, January 1996.
Catherine Meadows. A system for the specification and analysis of key management protocols. In Proceedings of the 1991 IEEE Symposium on Research in Security and Privacy, pages 182–195, 1991.
Catherine Meadows. Panel on languages for formal specification of security protocols. In Proceedings of the 10th IEEE Computer Security Foundations Workshop, page 96, 1997.
Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996.
Jonathan K. Millen, Sidney C. Clark, and Sheryl B. Freedman. The Interrogator: Protocol security analysis. IEEE Transactions on Software Engineering, SE-13(2):274–288, February 1987.
Robin Milner, Joachim Parrow, and David Walker. A calculus of mobile processes, parts I and II. Information and Computation, 100:1–40 and 41-77, September 1992.
John C. Mitchell, Mark Mitchell, and Ulrich Stern. Automated analysis of cryptographic protocols using Murφ. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, pages 141–151, 1997.
Roger M. Needham and Michael D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993–999, December 1978.
L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1-2):85–128, 1998.
Michael Roe. Cryptography and Evidence. PhD thesis, University of Cambridge Computer Laboratory, 1997. Available as a technical report of the Centre for Communications Systems Research at http://www.ccsr.cam.ac.uk/techreports/.
Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer system. Proceedings of the IEEE, 63(9):1278–1308, September 1975.
Fred B. Schneider, editor. Trust in Cyberspace. National Academy Press, prepublication copy edition, 1998. Report of the Committee on Information Systems Trustworthiness, Computer Science and Telecommunications Board, National Research Council.
Steve Schneider. Verifying authentication protocols in CSP. IEEE Transactions on Software Engineering, 24(9):741–758, September 1998.
F. Javier Thayer Fábrega, Jonathan C. Herzog, and Joshua D. Guttman. Strand spaces: Why is a security protocol correct? In Proceedings 1998 IEEE Symposium on Security and Privacy, pages 160–171, May 1998.
Dennis Volpano, Cynthia Irvine, and Geoffrey Smith. A sound type system for secure flow analysis. Journal of Computer Security, 4:167–187, 1996.
David Wagner and Bruce Schneier. Analysis of the SSL 3.0 protocol. In Proceedings of the Second USENIX Workshop on Electronic Commerce Proceedings, pages 29–40, November 1996. A revised version is available at http://www.cs.berkeley.edu/~daw/me.html.
Edward Wobber, Martín Abadi, Michael Burrows, and Butler Lampson. Authentication in the Taos operating system. ACM Transactions on Computer Systems, 12(1):3–32, February 1994.
Thomas Y. C. Woo and Simon S. Lam. A semantic model for authentication protocols. In Proceedings of the 1993 IEEE Symposium on Research on Security and Privacy, pages 178–194, 1993.
Tatu Ylönen. SSH-Secure login connections over the Internet. In Proceedings of the Sixth USENIX Security Symposium, pages 37–42, July 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Abadi, M. (1999). Security Protocols and Specifications. In: Thomas, W. (eds) Foundations of Software Science and Computation Structures. FoSSaCS 1999. Lecture Notes in Computer Science, vol 1578. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49019-1_1
Download citation
DOI: https://doi.org/10.1007/3-540-49019-1_1
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65719-4
Online ISBN: 978-3-540-49019-7
eBook Packages: Springer Book Archive