Abstract
We propose to separate the specification and implementation phases in the conception of the cryptographic protocols. The specification phase describes the logic of the protocol. We develop a method for formally verifying this logic before the publication of the protocol. The implementation phase contains the choice of an appropriate cryptographic function.
This research was made when the author was Research Assistant for the National Fund for Scientific Research (Belgium) and “S.P.P.S.” Researcher at the University of Liège. She is now working in the Scientific Computer Science Group of the Research Centre of Solvay (Brussel).
Chapter PDF
Key words
References
M. Burrows, M. Abadi, and R. Needham. A Logic of Authentication. Technical Report 39, Digital — Systems Research Center (SRC), 1989.
P. Bieber. Aspects Epistémiques des Protocoles Cryptographiques. PhD thesis, Université Paul-Sabatier de Toulouse (Sciences), October 1989.
E.F. Brickell, P.J. Lee, and Y. Yacobi. Secure Audio Teleconference. In C. Pomerance, editor, Lecture Notes in Computer Science. Advances in Cryptology — CRYPTO'87, #293, pages 418–426. Springer-Verlag, 1988.
M. Blum and S. Micali. How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. SIAM Journal on Computing, 13(4):850–864, 1984.
CCITT. CCITT blue book, Recommendation X.509, The Directory — Authentication Framework, November 1988.
Don Coppersmith. Analysis of ISO/CCTTI Document X.509 Annex D. IBM Thomas J. Watson Research Center, Yorktown Heights, June 1989.
A. Fiat and A. Shamir. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In A. M. Odlyzko, editor, Lecture Notes in Computer Science. Advances in Cryptology — CRYPTO'86, #263, pages 186–194. Springer-Verlag, 1987.
S. Goldwasser, S. Micali, and C. Rackoff. The Knowledge Complexity of Interactive Proof-Systems. SIAM Journal on Computing, 18(1):186–208, 1989.
L. Gong, R. Needham, and R. Yahalom. Reasoning about Belief in Cryptographic Protocols. In Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pages 234–248. IEEE Computer Society Press, 1990.
C I'Anson and C. Mitchell. Security Defects in CCITT Recommendation X.509 — The Directory Authentication Framework. Computer Communication Review, 20(2):30–34, 1990.
ISO. 7498-2. Information processing systems-Open Systems Interconnection-Basic Reference Model-Part 2: Security Architecture, 1989.
R. A. Kemmerer. Analyzing Encryption Protocols Using Formal Verification Techniques. IEEE Journal on Selected Areas in Communications, 7(4):448–457, 1989.
J. K. Millen, S. C. Clark, and S. B. Freedman. The Interrogator: Protocol Security Analysis. IEEE Transactions on Software Engineering, 13(2):274–288, 1987.
C. Meadows. Representing Partial Knowledge in an Algebraic Security Model. In Proceedings of the Computer Security Foundations Workshop III, pages 23–31. IEEE Computer Society Press, 1990.
M. J. Merritt. Cryptographic Protocols. PhD thesis, Georgia Institute of Technology, 1983.
M. Merritt and P. Wolper. States of Knowledge in Cryptographic Protocols (extended abstract). Unpublished Manuscript, 1985.
P. Syverson. The Use of Logic in the Analysis of Cryptographic Protocols. In Proceedings of the 1991 IEEE Symposium on Research in Security and Privacy, pages 156–170. IEEE Computer Society Press, 1991.
M-J. Toussaint. Reasoning about Probabilistic Properties of Cryptographic Protocols (extended abstract). Abstract of the talk at the F.N.R.S. day on Computer Security, May 1989.
M-J. Toussaint. Formal Verification of Probabilistic Properties in Cryptographic Protocols (Extended Abstract), in the proceedings of ASIACRYPT'91, November 1991.
M.-J. Toussaint. Verification of Cryptographic Protocols. PhD thesis, Université de Liège (Belgium), 1991. in the Publications Collection (to appear).
M-J. Toussaint. Deriving the Complete Knowledge of Participants in Cryptographic Protocols (Extended Abstract). In J. Feigenbaum, editor, Lecture Notes in Computer Science. Advances in Cryptology — CRYPT0'91, #576, pages 24–43. Springer-Verlag, 1992.
M-J. Toussaint and P. Wolper. Reasoning about Cryptographic Protocols (Extended Abstract). In Joan Feigenbaum and Michael Merritt, editors, Distributed Computing and Cryptography (October 1989), pages 245–262. DIMACS-Series in Discrete Mathematics and Theoretical Computer Science (AMS-ACM), 1991. Volume 2.
Author information
Authors and Affiliations
Corresponding author
Editor information
Rights and permissions
Copyright information
© 1992 Springer-Verlag
About this paper
Cite this paper
Toussaint, MJ. (1992). Separating the specification and implementation phases in cryptology. In: Deswarte, Y., Eizenberg, G., Quisquater, JJ. (eds) Computer Security — ESORICS 92. ESORICS 1992. Lecture Notes in Computer Science, vol 648. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0013893
Download citation
DOI: https://doi.org/10.1007/BFb0013893
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-56246-7
Online ISBN: 978-3-540-47488-3
eBook Packages: Springer Book Archive