Skip to main content

Deriving Security Protocols Based on Protocol Derivation System

  • Conference paper
  • First Online:
Theoretical Computer Science (NCTCS 2020)

Abstract

Protocol Derivation System (PDS) supports syntactic derivations of complex protocols that use cryptographic primitives. However, the PDS is only applicable for two-party interaction protocols, which does not involve in the presence of a Trusted Third Party. In this paper, we proposed an extended PDS that can support key agreement protocols using a Trusted Thirty Party by adding some components, refinements, transformations and removing redundancy rules. A flow chart of deriving security protocols based on the extended PDS is given. The flow chart consists of two layers, the first layer is to get a raw protocol using components, refinements, transformations, the second layer is to remove superfluous protocol steps and improve protocol efficiency by removing redundancy rules. Finally, we get the AOR protocol as an example to illustrate how to derive a security protocol based on the extended PDS.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sihan, Q.: Twenty years development of security protocols research. J. Software 14(10), 1740–1752 (2000)

    MATH  Google Scholar 

  2. Yong, L., Fan, Z., Ming, Z.: Survey on security protocol space information network. Comput. Sci. 44(04), 202–206 (2017)

    Google Scholar 

  3. Lowe, G.: Breaking and fixing the Needham-Schroder public-key protocol using FDR. In: Proceeding of TACAS, LNCS 1055, Spring, pp. 147–166 (1996)

    Google Scholar 

  4. Avalle, M., Pironti, A., Sisto, R.: Formal verification of security protocol implementations: a survey. Formal Aspects of Comput. 26(1), 99–123 (2014)

    Article  Google Scholar 

  5. Jian, W., Naijun, Z., Fen, X., Liu, Z.: Overview of formal methods. J. Software, 30(01), 33–61 (2019)

    Google Scholar 

  6. Agray, N., Wiebe, V.D.H., De Vink, E.: On BAN logics for industrial security protocols. In: International Workshop of Central and Eastern Europe on Multi-Agent Systems. Springer, Berlin (2001)

    Google Scholar 

  7. Hess, A.V., Sebastian, M.: Formalizing and proving a typing result for security protocols in Isabelle/HOL. In: 2017 IEEE 30th Computer Security Foundations Symposium (CSF). IEEE (2017)

    Google Scholar 

  8. Basin, D., Cremers, C., Meadows, C.: Handbook of Model Checking- Model Checking Security Protocols, pp. 727–762. Springer, Cham (2018)

    MATH  Google Scholar 

  9. Datta, A., Derek, A., Mitchell, J.C., Roy, A.: “Protocol Composition Logic (PCL)”, Electronic Notes in Theoretical Computer Science. Gordon D, Plotkin Festschrift (2007)

    MATH  Google Scholar 

  10. Derek, A.: Formal analysis of security protocols: protocol composition logic, Ph.D. Dissertation, Stanford University (2007)

    Google Scholar 

  11. Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: A derivation system and compositional logic for security protocols. J. Comput. Security 13(3), 423–482 (2005)

    Article  Google Scholar 

  12. Roy, A., Datta, A., Derek, A., Mitchell, J.C., Seifert, J.-P.: Secrecy analysis in protocol composition logic. In: Formal Logical Methods for System Security and Correctness, IOS Press (2008)

    Google Scholar 

  13. Datta, A., Anupam, et al.: Computationally sound compositional logic for key exchange protocols. In: 19th IEEE Computer Security Foundations Workshop (CSFW 2006), IEEE (2006)

    Google Scholar 

  14. Li, X., Zhang, J., Ma, J.: UCAP: a PCL secure user authentication protocol in cloud computing. J. Commun. 39(08), 94–105 (2018)

    Google Scholar 

  15. Li, X., Zhang, J., Ma, J., Hai, L.: TSNP: a novel PCL-Secure and efficient group authentication protocol in space information network. J. Comput. Res. Dev. 53(10), 2376–2392 (2016)

    Google Scholar 

  16. Cremers, C.: On the protocol composition logic PCL. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (2008)

    Google Scholar 

  17. Zhang, J., Yang, C., Ma, J.: Protocol derivation system for the Needham-Schroeder family. In: 2011 6th International ICST Conference on Communications and Networking in China (CHINACOM), pp. 836–840 (2011)

    Google Scholar 

  18. Zhang, J., Ma, J., Chao, Y.: Protocol derivation system for the needham-schroeder family. Secur. Commun. Netw. 8, 2687–2703 (2015)

    Article  Google Scholar 

  19. Lu, L.: Study on theory and applications of security protocols formal analysis, Ph.D. Dissertation, Xidian University (2012)

    Google Scholar 

  20. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory, IT-22(6), 644–654 (1976)

    Google Scholar 

  21. Datta, A., Mitchell, J.C., Pavlovic, D.: Derivation of the JFK protocol, Technical Report KES.U.02.03, Kestrel Institute (2002)

    Google Scholar 

  22. Lu, L., Duan, X., Ma, J.: Improvement and formal proof on protocol Otway-Rees. J. Commun. 33(1), 250–254 (2012)

    Google Scholar 

Download references

Acknowledgements

This work is supported by following projects: The National Natural Science Foundation of China under Grant No.61962020 and No.61562026, the Jiangxi Province Key Subject Academic and Technical Leader Funding Project under Grant No. 2017XSDTR0105.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Meihua Xiao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yang, K., Xiao, M., Song, Z., Ouyang, R. (2021). Deriving Security Protocols Based on Protocol Derivation System. In: He, K., Zhong, C., Cai, Z., Yin, Y. (eds) Theoretical Computer Science. NCTCS 2020. Communications in Computer and Information Science, vol 1352. Springer, Singapore. https://doi.org/10.1007/978-981-16-1877-2_12

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-1877-2_12

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-1876-5

  • Online ISBN: 978-981-16-1877-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics