ACM Transactions on Computer Systems (TOCS)
A calculus for cryptographic protocols
Information and Computation
Secrecy by typing in security protocols
Journal of the ACM (JACM)
Strand spaces: proving security protocols correct
Journal of Computer Security
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
TACAs '96 Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems
Secrecy Types for Asymmetric Communication
FoSSaCS '01 Proceedings of the 4th International Conference on Foundations of Software Science and Computation Structures
Proving Properties of Security Protocols by Induction
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Authenticity by Typing for Security Protocols
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Theory generation for security protocols
Theory generation for security protocols
Hi-index | 0.00 |
We propose a new sub-term relation to specify syntax of messages with MAC (Message Authentication Code) payload for the cryptographic protocols in the strand space model. The sub-term relation was introduced to formal analysis of cryptographic protocols based on theorem proving, but some defects have been found in it. In the present paper, first, the operatorf is defined to the extend sub-term relation, which is used to amend its original flaws. Second, a new ideal is constructed, and is used to expand the bounds on the penetrator's abilities. Third, the decidable theorem for honesty of ideals holds as it is described under the extended sub-term relation is proved. Fourth, we propose the theorem of the satisfiability for decidable conditions of honest ideals and annotate how invariant-sets generate, which is used to verify security properties of cryptographic protocols.