Proof-Based design of security protocols

  • Authors:
  • Nazim Benaissa;Dominique Méry

  • Affiliations:
  • LORIA, Université Henri Poincaré Nancy 1, Vandœuvre-lès-Nancy, France;LORIA, Université Henri Poincaré Nancy 1, Vandœuvre-lès-Nancy, France

  • Venue:
  • CSR'10 Proceedings of the 5th international conference on Computer Science: theory and Applications
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

We consider the refinement-based process for the development of security protocols. Our approach is based on the Event B refinement, which makes proofs easier and which makes the design process faithfull to the structure of the protocol as the designer thinks of it. We introduce the notion of mechanism related to a given security property; a mechanism can be combined with another mechanism through the double refinement process ensuring the preservation of previous security properties of mechanisms. Mechanisms and combination of mechanisms are based on Event B models related to the security property of the current mechanism. Analysing cryptographic protocols requires precise modelling of the attacker’s knowledge and the attacker’s behaviour conforms to the Dolev-Yao model.