Completeness of the authentication tests

  • Authors:
  • Shaddin F. Doghmi;Joshua D. Guttman;F. Javier Thayer

  • Affiliations:
  • The MITRE Corporation;The MITRE Corporation;The MITRE Corporation

  • Venue:
  • ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Protocol participants manipulate values, transforming the cryptographic contexts in which they occur. The rules of the protocol determine which transformations are permitted. We formalize these transformations, obtaining new versions of the two authentication tests from earlier strand space papers. We prove that the new versions are complete, in this sense: any collection of behaviors that satisfies those two authentication tests, when combined with some feasible adversary behavior, yields a possible execution. We illustrate the strengthened authentication tests with brief analyses of three protocols.