Abstract
In the areas of computer security and cryptography a standard model for adversaries is the Dolev-Yao threat model. In the areas of formal analysis of complex, concurrent, communication and reactive systems, one of the foundations for formal analysis methodologies is a structured operational semantics (SOS) for Milner’s process algebra Calculus of Communicating Systems (CCS). In this paper we provide a CCS-SOS modelling of the Dolev-Yao threat model. The intuitively appealing modelling indicates a suitability for the well studied formal analysis methodologies based on CCS-SOS being applied to computer security and cryptography.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Clarke, E.M., Jha, S., Marrero, W.: Using state space exploration and a natural deduction style message derivation engine to verify security protocols. In: Proc. IFIP Working Conference on Programming Concepts, and Methods (PROCOMET) (June 1998)
CWB. The Edinburgh Concurrency Workbench, Available at http://www.dcs.ed.ac.uk/home/cwb/
Denning, D., Sacco, G.: Timestamps in key distribution protocols. Communications of the ACM 24(8), 533–536 (1981)
Dolev, D., Yao, A.C.: On the security of public key protocols. In: Proceedings of the IEEE 22nd Annual Symposium on Foundations of Computer Science, pp. 350–357 (1981)
Hennessy, M.: Algebraic Theory of Processes. The MIT Press, Cambridge (1988)
Hoare, C.A.R.: Communicating sequential processes. Communications of the ACMÂ 21(8) (1978)
Hoare, C.A.R.: Communicating Sequential Processes. Series in Computer Science. Prentice Hall International, Englewood Cliffs (1985)
Marrero, W.: BRUTUS: A Model Checker for Security Protocols, Ph.D. Thesis, CMU-CS-01-170, School of Computer Science, Carnegie Mellon University (December 2001)
Milner, R.: A Calculus of Communicating Systems. Springer, Heidelberg (1980)
Milner, R.: Communication and Concurrency. Series in Computer Science. Prentice Hall International, Englewood Cliffs (1989)
Needham, R., Schroeder, M.: Using encryption for authentication in large networks of computers. Communications of the ACM 21(12), 993–999 (1978)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mao, W. (2004). A Structured Operational Modelling of the Dolev-Yao Threat Model. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2002. Lecture Notes in Computer Science, vol 2845. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39871-4_5
Download citation
DOI: https://doi.org/10.1007/978-3-540-39871-4_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20830-3
Online ISBN: 978-3-540-39871-4
eBook Packages: Springer Book Archive