Fault-perserving simplifying transformations for security protocols

  • Authors:
  • Mei Lin Hui;Gavin Lowe

  • Affiliations:
  • -;-

  • Venue:
  • Journal of Computer Security
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

Recent techniques for analyzing security protocols have tended toconcentrate upon the small protocols that are typically found inthe academic literature. However, there is a huge gulf betweenthese and most large commercial protocols: the latter typicallyhave many more fields, and much higher levels of nested encryption.As a result, existing techniques are difficult to apply directly tothese large protocols. In this paper we develop the notion of fault-preservingsimplifying transformations: transformations that have the propertyof preserving insecurities; the effect of such transformations isthat if we can verify the transformed protocol, then we will haveverified the original protocol. We identify a number of suchfault-preserving simplifying transformations, and use them in theanalysis of a commercial protocol.