Abstract
Protocol Derivation System (PDS) supports syntactic derivations of complex protocols that use cryptographic primitives. However, the PDS is only applicable for two-party interaction protocols, which does not involve in the presence of a Trusted Third Party. In this paper, we proposed an extended PDS that can support key agreement protocols using a Trusted Thirty Party by adding some components, refinements, transformations and removing redundancy rules. A flow chart of deriving security protocols based on the extended PDS is given. The flow chart consists of two layers, the first layer is to get a raw protocol using components, refinements, transformations, the second layer is to remove superfluous protocol steps and improve protocol efficiency by removing redundancy rules. Finally, we get the AOR protocol as an example to illustrate how to derive a security protocol based on the extended PDS.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sihan, Q.: Twenty years development of security protocols research. J. Software 14(10), 1740–1752 (2000)
Yong, L., Fan, Z., Ming, Z.: Survey on security protocol space information network. Comput. Sci. 44(04), 202–206 (2017)
Lowe, G.: Breaking and fixing the Needham-Schroder public-key protocol using FDR. In: Proceeding of TACAS, LNCS 1055, Spring, pp. 147–166 (1996)
Avalle, M., Pironti, A., Sisto, R.: Formal verification of security protocol implementations: a survey. Formal Aspects of Comput. 26(1), 99–123 (2014)
Jian, W., Naijun, Z., Fen, X., Liu, Z.: Overview of formal methods. J. Software, 30(01), 33–61 (2019)
Agray, N., Wiebe, V.D.H., De Vink, E.: On BAN logics for industrial security protocols. In: International Workshop of Central and Eastern Europe on Multi-Agent Systems. Springer, Berlin (2001)
Hess, A.V., Sebastian, M.: Formalizing and proving a typing result for security protocols in Isabelle/HOL. In: 2017 IEEE 30th Computer Security Foundations Symposium (CSF). IEEE (2017)
Basin, D., Cremers, C., Meadows, C.: Handbook of Model Checking- Model Checking Security Protocols, pp. 727–762. Springer, Cham (2018)
Datta, A., Derek, A., Mitchell, J.C., Roy, A.: “Protocol Composition Logic (PCL)”, Electronic Notes in Theoretical Computer Science. Gordon D, Plotkin Festschrift (2007)
Derek, A.: Formal analysis of security protocols: protocol composition logic, Ph.D. Dissertation, Stanford University (2007)
Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: A derivation system and compositional logic for security protocols. J. Comput. Security 13(3), 423–482 (2005)
Roy, A., Datta, A., Derek, A., Mitchell, J.C., Seifert, J.-P.: Secrecy analysis in protocol composition logic. In: Formal Logical Methods for System Security and Correctness, IOS Press (2008)
Datta, A., Anupam, et al.: Computationally sound compositional logic for key exchange protocols. In: 19th IEEE Computer Security Foundations Workshop (CSFW 2006), IEEE (2006)
Li, X., Zhang, J., Ma, J.: UCAP: a PCL secure user authentication protocol in cloud computing. J. Commun. 39(08), 94–105 (2018)
Li, X., Zhang, J., Ma, J., Hai, L.: TSNP: a novel PCL-Secure and efficient group authentication protocol in space information network. J. Comput. Res. Dev. 53(10), 2376–2392 (2016)
Cremers, C.: On the protocol composition logic PCL. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (2008)
Zhang, J., Yang, C., Ma, J.: Protocol derivation system for the Needham-Schroeder family. In: 2011 6th International ICST Conference on Communications and Networking in China (CHINACOM), pp. 836–840 (2011)
Zhang, J., Ma, J., Chao, Y.: Protocol derivation system for the needham-schroeder family. Secur. Commun. Netw. 8, 2687–2703 (2015)
Lu, L.: Study on theory and applications of security protocols formal analysis, Ph.D. Dissertation, Xidian University (2012)
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory, IT-22(6), 644–654 (1976)
Datta, A., Mitchell, J.C., Pavlovic, D.: Derivation of the JFK protocol, Technical Report KES.U.02.03, Kestrel Institute (2002)
Lu, L., Duan, X., Ma, J.: Improvement and formal proof on protocol Otway-Rees. J. Commun. 33(1), 250–254 (2012)
Acknowledgements
This work is supported by following projects: The National Natural Science Foundation of China under Grant No.61962020 and No.61562026, the Jiangxi Province Key Subject Academic and Technical Leader Funding Project under Grant No. 2017XSDTR0105.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Yang, K., Xiao, M., Song, Z., Ouyang, R. (2021). Deriving Security Protocols Based on Protocol Derivation System. In: He, K., Zhong, C., Cai, Z., Yin, Y. (eds) Theoretical Computer Science. NCTCS 2020. Communications in Computer and Information Science, vol 1352. Springer, Singapore. https://doi.org/10.1007/978-981-16-1877-2_12
Download citation
DOI: https://doi.org/10.1007/978-981-16-1877-2_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-1876-5
Online ISBN: 978-981-16-1877-2
eBook Packages: Computer ScienceComputer Science (R0)