Abstract
We present an abstract formal model for protocols, based on abstract logical secure channels. Unlike other models it is not primarily intended for protocol analysis but to serve as the top layer of a layered top-down design method for protocols. We show examples of key establishment protocols for which this model can be used. Modular design of protocols is supported with a concatenation theorem for protocols.
Supported by a DAAD-fellowship HSP III. This article has been finished when the author was visiting Queensland University of Technology, Brisbane, Australia.
Preview
Unable to display preview. Download preview PDF.
References
Martin Abadi and Roger Needham. Prudent Engineering Practice for Cryptographic Protocols. 1994 IEEE Computer Society Symposium on Security and Privacy, pages 122–136, Los Alamitos, California, 1994. IEEE Computer Society Press.
Ross Anderson and Roger Needham. Robustness Principles for public key protocols. In D. Coppersmith, editor, Advances in Cryptology — CRYPTO '95, volume 963 of Lecture Notes in Computer Science, Berlin, 1995. Springer Verlag.
Colin Boyd. A Framework for Design of Key Establishment Protocols, Lecture Notes in Computer Science, 1172:146–157, 1996.
S. Budowski and P. Dembinski. An introduction to Estelle. Computer Networks and ISDN-Systems, 14:3–23, 1987.
John Clark and Jeremy Jacob. On the security of recent protocols. Information Processing Letters, 56:151–155, 1995.
L. Gong and P. Syverson. Fail-Stop Protocols: An approach to Designing Secure Protocols. In Proceedings of DCCA-5: Fifth International Working Conference on Dependable Computing for Critical Applications, pages 44–55, September 1995.
Nevin Heintze and J.D. Tygar. A Model for Secure Protocols and Their Compositions. In 1994 IEEE Computer Society Symposium on Research in Security and Privacy, pages 2–13. IEEE Computer Society Press, May 1994.
Ueli M. Maurer and Pierre E. Schmid. A Calculus for Secure Channel Establishment in Open Networks. In Dieter Gollmann, editor, Computer Security — ESORICS 94, volume 875, of LNCS, pages 175–192, Springer Verlag, 1994.
Catherine Meadows. Formal Verification of Cryptographic Protocols: A Survey. In Advances in Cryptology — Asiacrypt '94, volume 917, of LNCS, pages 133–150. Springer Verlag, 1995.
Peter OchsenschlÄger and Rainer Prinoth. Modellierung verteilter Systeme. Vieweg, 1995. ISBN 3-528-05433-6.
Peter OchsenschlÄger. Kooperationsprodukte formaler Sprachen und schlichte Homomorphismen. Arbeitspapier 1092. Institut für Telekooperation der GMD, 1996.
Peter OchsenschlÄger, Jürgen Repp, Roland Rieke and Ulrich Nitsche. The SH-Verification Tool, Instruments for Verifying Co-operating Systems. Technical Report. GMD — German National Research Center for Information Technology, 1997
R. Saracco, J.R.W. Smith and R. Reed Telecommunication Systems' Engineering using SDL. North Holland, 1989
Paul Syverson, Limitations on Design Principles for Public Key Protocols. Proceedings of IEEE Symposium on Security and Privacy. 1996
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rudolph, C. (1998). A formal model for systematic design of key establishment protocols. In: Boyd, C., Dawson, E. (eds) Information Security and Privacy. ACISP 1998. Lecture Notes in Computer Science, vol 1438. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0053745
Download citation
DOI: https://doi.org/10.1007/BFb0053745
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64732-4
Online ISBN: 978-3-540-69101-3
eBook Packages: Springer Book Archive