Protocol-Independent Secrecy

  • Authors:
  • Jon Millen;Harald Rueβ

  • Affiliations:
  • -;-

  • Venue:
  • SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
  • Year:
  • 2000

Quantified Score

Hi-index 0.00

Visualization

Abstract

Inductive proofs of secrecy invariants for cryptographic protocols can be facilitated by separating the protocol-dependent part from the protocol-independent part. Our secrecy theorem encapsulates the use of induction so that the discharge of protocol-specific proof obligations is reduced to first-order reasoning. In addition, the verification conditions are modularly associated with the protocol messages. Secrecy proofs for Otway-Rees and the corrected Needham-Schroeder protocol are given.