Login (DCU Staff Only)
Login (DCU Staff Only)

DORAS | DCU Research Repository

Explore open access research and scholarly works from DCU

Advanced Search

Holistic analysis of mix protocols

Bella, Giampaolo, Butin, Denis Frédéric and Gray, David (2011) Holistic analysis of mix protocols. In: 7th International Conference on Information Assurance and Security (IAS 2011), 5-8 Dec 2011, Malacca, Malaysia. ISBN 978-1-4577-2154-0

Abstract
Security protocols are often analysed in isolation as academic challenges. However, the real world can require various combinations of them, such as a certified email protocol executed over a resilient channel, or the key registration protocol to precede the purchase protocols of Secure Electronic Transactions (SET). We develop what appears to be the first scalable approach to specifying and analysing mix protocols. It expands on the Inductive Method by exploiting the simplicity with which inductive definitions can refer to each other. This lets the human analyst study each protocol separately first, and then derive holistic properties about the mix. The approach, which is demonstrated on the sequential composition of a certification protocol with an authentication one, is not limited by the features of the protocols, which can, for example, share message components such as cryptographic keys and nonces. It bears potential for the analysis of complex protocols constructed by general composition of others.
Metadata
Item Type:Conference or Workshop Item (Paper)
Event Type:Conference
Refereed:Yes
Uncontrolled Keywords:Inductive Method; Theorem Proving; Isabelle; Security
Subjects:Computer Science > Computer security
DCU Faculties and Centres:DCU Faculties and Schools > Faculty of Engineering and Computing > School of Computing
Published in: Proceedings of the 7th International Conference on Information Assurance and Security (IAS 2011). . IEEE. ISBN 978-1-4577-2154-0
Publisher:IEEE
Official URL:http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp...
Copyright Information:© 2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.
Use License:This item is licensed under a Creative Commons Attribution-NonCommercial-Share Alike 3.0 License. View License
Funders:SFI
ID Code:17047
Deposited On:28 May 2012 13:01 by Butin Denis . Last Modified 19 Jul 2018 14:56
Documents

Full text available as:

[thumbnail of paper-db.pdf]
Preview
PDF - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader
219kB
Downloads

Downloads

Downloads per month over past year

Archive Staff Only: edit this record