Events in security protocols

  • Authors:
  • Federico Crazzolara;Glynn Winskel

  • Affiliations:
  • BRICS, Centre of the Danish National Research Foundation;University of Cambridge, England

  • Venue:
  • CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

The events of a security protocol and their causal dependency can play an important role in the analysis of security properties. This insight underlies both strand spaces and the inductive method. But neither of these approaches builds up the events of a protocol in a compositional way, so that there is an informal spring from the protocol to its model. By broadening the models to certain kinds of Petri nets, a restricted form of contextual nets, a compositional event-based semantics is given to an economical, but expressive, language for describing security protocols; so the events and dependency of a wide range of protocols are determined once and for all. The net semantics is formally related to a transition semantics, strand spaces and inductive rules, as well as trace languages and event structures, so unifying a range of approaches, as well as providing conditions under which particular, more limited, models are adequate for the analysis of protocols. The net semantics allows the derivation of general properties and proof principles which are demonstrated in establishing an authentication property, following a diagrammatic style of proof.