Skip to main content

A Structured Operational Modelling of the Dolev-Yao Threat Model

  • Conference paper
Security Protocols (Security Protocols 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2845))

Included in the following conference series:

Abstract

In the areas of computer security and cryptography a standard model for adversaries is the Dolev-Yao threat model. In the areas of formal analysis of complex, concurrent, communication and reactive systems, one of the foundations for formal analysis methodologies is a structured operational semantics (SOS) for Milner’s process algebra Calculus of Communicating Systems (CCS). In this paper we provide a CCS-SOS modelling of the Dolev-Yao threat model. The intuitively appealing modelling indicates a suitability for the well studied formal analysis methodologies based on CCS-SOS being applied to computer security and cryptography.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Clarke, E.M., Jha, S., Marrero, W.: Using state space exploration and a natural deduction style message derivation engine to verify security protocols. In: Proc. IFIP Working Conference on Programming Concepts, and Methods (PROCOMET) (June 1998)

    Google Scholar 

  2. CWB. The Edinburgh Concurrency Workbench, Available at http://www.dcs.ed.ac.uk/home/cwb/

  3. Denning, D., Sacco, G.: Timestamps in key distribution protocols. Communications of the ACM 24(8), 533–536 (1981)

    Article  Google Scholar 

  4. Dolev, D., Yao, A.C.: On the security of public key protocols. In: Proceedings of the IEEE 22nd Annual Symposium on Foundations of Computer Science, pp. 350–357 (1981)

    Google Scholar 

  5. Hennessy, M.: Algebraic Theory of Processes. The MIT Press, Cambridge (1988)

    MATH  Google Scholar 

  6. Hoare, C.A.R.: Communicating sequential processes. Communications of the ACM 21(8) (1978)

    Google Scholar 

  7. Hoare, C.A.R.: Communicating Sequential Processes. Series in Computer Science. Prentice Hall International, Englewood Cliffs (1985)

    MATH  Google Scholar 

  8. Marrero, W.: BRUTUS: A Model Checker for Security Protocols, Ph.D. Thesis, CMU-CS-01-170, School of Computer Science, Carnegie Mellon University (December 2001)

    Google Scholar 

  9. Milner, R.: A Calculus of Communicating Systems. Springer, Heidelberg (1980)

    MATH  Google Scholar 

  10. Milner, R.: Communication and Concurrency. Series in Computer Science. Prentice Hall International, Englewood Cliffs (1989)

    MATH  Google Scholar 

  11. Needham, R., Schroeder, M.: Using encryption for authentication in large networks of computers. Communications of the ACM 21(12), 993–999 (1978)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mao, W. (2004). A Structured Operational Modelling of the Dolev-Yao Threat Model. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2002. Lecture Notes in Computer Science, vol 2845. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39871-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39871-4_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20830-3

  • Online ISBN: 978-3-540-39871-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics