A typed specification for security protocols

  • Authors:
  • Genge Bela;Iosif Ignat

  • Affiliations:
  • Computer Science Department, Technical University of Cluj-Napoca, Cluj-Napoca, Romania;Computer Science Department, Technical University of Cluj-Napoca, Cluj-Napoca, Romania

  • Venue:
  • DNCOCO'06 Proceedings of the 5th WSEAS international conference on Data networks, communications and computers
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Security protocol attacks are known to have various sources, from flawed implementations, to running parallel sessions of the same protocol. Because of this attack diversity, it is quite difficult (or impossible) to create an abstract model that is suitable for analyzing a protocol against all possible attacks. However, if we categorize the attacks based on their characteristics we should be able to create multiple abstract models that simplify the analysis. Therefore, in this paper we identify attacks based on message similarities, that we call "structural attacks", and create an abstract model, based on message component types (session keys, nonces, participants), that is powerful enough to capture the structure of security protocol messages.