Skip to main content

Experiences in the Formal Analysis of the Group Domain of Interpretation Protocol (GDOI)

  • Chapter
Verlässliche IT-Systeme 2001

Part of the book series: DuD-Fachbeiträge ((DUD))

  • 88 Accesses

Abstract

Although research in the application of formal methods to cryptographic protocol analysis has been growing rapidly, it has of yet had little influence on the design and implementation of protocols intended for actual use. This is not because the designers of cryptographic protocols do not recognize the important of assurance, but rather seems the result of the fact that currently there are no good pathways for introducing formal analysis into the design process. In this paper we describe how we are attempting to help remedy this lack by working with the MSec working group in the Internet Engineering Task Force on the design and analysis of the Group Domain of Interpretation Protocol (GDOI), a secure multicast protocol intended to work with the Internet Key Exchange protocol. The purpose of our work has been two-fold: first, to identify and correct errors and ambiguities early on, and secondly to speed up the standardization process by providing increased evidence of GDOI’s soundness. In this paper we give a brief description of our ongoing work in the analysis of GDOI, and point both the benefits realized by the analysis and some of the open questions that raised by our experiences.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baugher, Mark, Thomas Hardjono, Hugh Harney, and Brian Weis: Group Domain of Interpretation for ISAKMP, Internet Draft smug-irtf-gdoi-01.txt, January 4, 2001.

    Google Scholar 

  2. Canetti, R., J, Gray, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas: Multicast security: a taxonomy and some efficient constructions, Proceedings of INFOCOM 99, March 1999, pp. 708–716.

    Google Scholar 

  3. Harkins, D. and D. Carrel: The Internet Key Exchange (IKE), RFC 2409, November 1998.

    Google Scholar 

  4. Meadows, Catherine: The NRL Protocol Analyzer: an overview, Journal of Logic Programming, vol. 26, no. 2, 1996, pp. 113–131.

    Article  MATH  Google Scholar 

  5. Meadows, Catherine, Paul Syverson and Iliano Cervesato, Formalizing GDOI group key management requirements in NPATRL, Proceedings of the ACM Conference on Computer and Communications Security 2001, to appear, November 2001.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Dirk Fox Marit Köhntopp Andreas Pfitzmann

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer Fachmedien Wiesbaden

About this chapter

Cite this chapter

Meadows, C. (2001). Experiences in the Formal Analysis of the Group Domain of Interpretation Protocol (GDOI). In: Fox, D., Köhntopp, M., Pfitzmann, A. (eds) Verlässliche IT-Systeme 2001. DuD-Fachbeiträge. Vieweg+Teubner Verlag, Wiesbaden. https://doi.org/10.1007/978-3-663-05918-9_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-663-05918-9_10

  • Publisher Name: Vieweg+Teubner Verlag, Wiesbaden

  • Print ISBN: 978-3-663-05919-6

  • Online ISBN: 978-3-663-05918-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics