Minimal backups of cryptographic protocol runs

  • Authors:
  • Jay A. McCarthy;Shriram Krishnamurthi

  • Affiliations:
  • Brigham Young University, Provo, UT, USA;Brown University, Providence, RI, USA

  • Venue:
  • Proceedings of the 6th ACM workshop on Formal methods in security engineering
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

As cryptographic protocols execute they accumulate information such as values and keys, and evidence of properties about this information. As execution proceeds, new information becomes relevant while some old information ceases to be of use. Identifying what information is necessary at each point in a protocol run is valuable for both analysis and deployment. We formalize this necessary information as the minimal backup of a protocol. We present an analysis that determines the minimal backup at each point in a protocol run. We show that this minimal backup has many uses: it serves as a foundation for job-migration and other kinds of fault-tolerance, and also assists protocol designers understand the structure of protocols and identify potential flaws. In a cryptographic context it is dangerous to reason informally. We have therefore formalized and verified this work using the Coq proof assistant. Additionally, Coq provides a certified implementation of our analysis. Concretely, our analysis and its implementation consume protocols written in a variant of the Cryptographic Protocol Programming Language, CPPL.