Abstract
We show how a type of atoms, which behave like urelements, and a new proposition that expresses the independence of a term from an atom can be added to any logical system after imposing minor restrictions on definitions and computations. Working in constructive type theory, we give rules for the independence proposition and show how cryptographic protocols can be modeled as automata exchanging atoms. This model provides a unifying framework for reasoning about security and allows us to combine a general model of computation with a simple model of acquisition of secret information. As an application, we prove a fundamental property of nonces that justifies the axioms for nonces used in the protocol composition logic (PCL) of Datta, Derek, Mitchell and Roy. The example shows that basic security properties are naturally expressed in terms of independence and the causal ordering of events. The rules and example proofs are fully implemented in the Nuprl proof development system.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Allen, S.F.: A non-type-theoretic definition of martin-löf’s types. In: Proceedings of Second IEEE Symposium on Logic in Computer Science, pp. 215–224 (1987)
Allen, S.F.: An Abstract Semantics for Atoms in Nuprl. Cornell Tech Report TR2006-2032 (2006)
Bickford, M.: Event systems. Nuprl Math Library Book webpage (2003)
Bickford, M., Constable, R.L.: A logic of events. Technical Report TR2003-1893, Cornell University (2003)
Blass, A., Gurevich, Y., Shelah, S.: Choiceless polynomial time. Pure and Applied Logic 100, 141–187 (1999)
Constable, R.L.: Types in logic, mathematics and programming. In: Buss, S.R. (ed.) Handbook of Proof Theory, pp. 683–786. Elsevier Science B.V, Amsterdam (1998)
Datta, A., Derek, A., Mitchell, J., Ramanathan, A., Scedrov, A.: Games and the impossibility of realizable ideal functionality. In: Proceedings of 16th IEEE Computer Security Foundations Workshop, pp. 360–379 (March 2006)
Datta, A., Derek, A., Mitchell, J.C., Roy, A.: Protocol composition logic (pcl). In: Plotkin Festschrift, G.D. (ed.) Electronic Notes in Theoretical Computer Science (to appear, 2007)
Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory 29(2), 198–208 (1983)
Durgin, N., Lincoln, P., Mitchell, J., Scedrov, A.: Multiset rewriting and the complexity of bounded security protocols (2002)
Gabbay, M.J., Pitts, A.M.: A new approach to abstract syntax with variable binding. Formal Aspects of Computing 13, 341–363 (2002)
Goldreich, O.: Foundations of Cryptography. Basic Tools, vol. 1. Cambridge University Press, Cambridge (2001)
Martin-Löf, P.: Constructive mathematics and computer programming. In: 6th International Congress for Logic, Methodology, and Philosophy of Science, North Holland, Amsterdam (1982)
Meadows, C.A.: Formal verification of cryptographic protocols: A survey. In: ASIACRYPT: Advances in Cryptology – ASIACRYPT: International Conference on the Theory and Application of Cryptology. LNCS. Springer, Heidelberg (1994)
Millen, J.K., Rueß, H.: Protocol-independent secrecy. In: IEEE Symposium on Security and Privacy, pp. 110–209 (2000)
Nipkow, T., Paulson, L.C., Wenzel, M.: Isabelle/HOL — A Proof Assistant for Higher-Order Logic, vol. 2283. Springer, Heidelberg (2002)
Paulson,: Proving security protocols correct. In: LICS: IEEE Symposium on Logic in Computer Science (1999)
Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security 6(1-2), 85–128 (1998)
Pfenning, F., Schürmann, C.: Twelf — a meta-logical framework for deductive systems, pp. 202–206 (1999)
Thayer, F.J., Herzog, J.C., Guttman, J.D.: Strand spaces: Proving security protocols correct. Journal of Computer Security 7(1) (1999)
Troelstra, A.: Choice Sequences. Clarendon Press, Oxford (1977)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bickford, M. (2008). Unguessable Atoms: A Logical Foundation for Security. In: Shankar, N., Woodcock, J. (eds) Verified Software: Theories, Tools, Experiments. VSTTE 2008. Lecture Notes in Computer Science, vol 5295. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-87873-5_7
Download citation
DOI: https://doi.org/10.1007/978-3-540-87873-5_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-87872-8
Online ISBN: 978-3-540-87873-5
eBook Packages: Computer ScienceComputer Science (R0)