A compositional logic for proving security properties of protocols

  • Authors:
  • Nancy Durgin;John Mitchell;Dusko Pavlovic

  • Affiliations:
  • Sandia National Labs, P.O. Box 969, Livermore, CA;Computer Science Department, Stanford University, Stanford, CA;Kestrel Institute, Palo Alto, CA

  • Venue:
  • Journal of Computer Security - Special issue on CSFW14
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present a logic for proving security properties of protocols that use nonces (randomly generated numbers that uniquely identify a protocol session) and public-key cryptography. The logic, designed around a process calculus with actions for each possible protocol step, consists of axioms about protocol actions and inference rules that yield assertions about protocols composed of multiple steps. Although assertions are written using only steps of the protocol, the logic is sound in a stronger sense: each provable assertion about an action or sequence of actions holds in any run of the protocol that contains the given actions and arbitrary additional actions by a malicious attacker. This approach lets us prove security properties of protocols under attack while reasoning only about the sequence of actions taken by honest parties to the protocol. The main security-specific parts of the proof system are rules for reasoning about the set of messages that could reveal secret data and an invariant ride called the "honesty rule".