Skip to main content

A formal model for systematic design of key establishment protocols

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1438))

Included in the following conference series:

  • 114 Accesses

Abstract

We present an abstract formal model for protocols, based on abstract logical secure channels. Unlike other models it is not primarily intended for protocol analysis but to serve as the top layer of a layered top-down design method for protocols. We show examples of key establishment protocols for which this model can be used. Modular design of protocols is supported with a concatenation theorem for protocols.

Supported by a DAAD-fellowship HSP III. This article has been finished when the author was visiting Queensland University of Technology, Brisbane, Australia.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Martin Abadi and Roger Needham. Prudent Engineering Practice for Cryptographic Protocols. 1994 IEEE Computer Society Symposium on Security and Privacy, pages 122–136, Los Alamitos, California, 1994. IEEE Computer Society Press.

    Google Scholar 

  2. Ross Anderson and Roger Needham. Robustness Principles for public key protocols. In D. Coppersmith, editor, Advances in Cryptology — CRYPTO '95, volume 963 of Lecture Notes in Computer Science, Berlin, 1995. Springer Verlag.

    Google Scholar 

  3. Colin Boyd. A Framework for Design of Key Establishment Protocols, Lecture Notes in Computer Science, 1172:146–157, 1996.

    Article  Google Scholar 

  4. S. Budowski and P. Dembinski. An introduction to Estelle. Computer Networks and ISDN-Systems, 14:3–23, 1987.

    Article  Google Scholar 

  5. John Clark and Jeremy Jacob. On the security of recent protocols. Information Processing Letters, 56:151–155, 1995.

    Article  MATH  Google Scholar 

  6. L. Gong and P. Syverson. Fail-Stop Protocols: An approach to Designing Secure Protocols. In Proceedings of DCCA-5: Fifth International Working Conference on Dependable Computing for Critical Applications, pages 44–55, September 1995.

    Google Scholar 

  7. Nevin Heintze and J.D. Tygar. A Model for Secure Protocols and Their Compositions. In 1994 IEEE Computer Society Symposium on Research in Security and Privacy, pages 2–13. IEEE Computer Society Press, May 1994.

    Google Scholar 

  8. Ueli M. Maurer and Pierre E. Schmid. A Calculus for Secure Channel Establishment in Open Networks. In Dieter Gollmann, editor, Computer Security — ESORICS 94, volume 875, of LNCS, pages 175–192, Springer Verlag, 1994.

    Google Scholar 

  9. Catherine Meadows. Formal Verification of Cryptographic Protocols: A Survey. In Advances in Cryptology — Asiacrypt '94, volume 917, of LNCS, pages 133–150. Springer Verlag, 1995.

    Google Scholar 

  10. Peter OchsenschlÄger and Rainer Prinoth. Modellierung verteilter Systeme. Vieweg, 1995. ISBN 3-528-05433-6.

    Google Scholar 

  11. Peter OchsenschlÄger. Kooperationsprodukte formaler Sprachen und schlichte Homomorphismen. Arbeitspapier 1092. Institut für Telekooperation der GMD, 1996.

    Google Scholar 

  12. Peter OchsenschlÄger, Jürgen Repp, Roland Rieke and Ulrich Nitsche. The SH-Verification Tool, Instruments for Verifying Co-operating Systems. Technical Report. GMD — German National Research Center for Information Technology, 1997

    Google Scholar 

  13. R. Saracco, J.R.W. Smith and R. Reed Telecommunication Systems' Engineering using SDL. North Holland, 1989

    Google Scholar 

  14. Paul Syverson, Limitations on Design Principles for Public Key Protocols. Proceedings of IEEE Symposium on Security and Privacy. 1996

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Colin Boyd Ed Dawson

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rudolph, C. (1998). A formal model for systematic design of key establishment protocols. In: Boyd, C., Dawson, E. (eds) Information Security and Privacy. ACISP 1998. Lecture Notes in Computer Science, vol 1438. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0053745

Download citation

  • DOI: https://doi.org/10.1007/BFb0053745

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64732-4

  • Online ISBN: 978-3-540-69101-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics