Secure protocol composition

  • Authors:
  • Anupam Datta;Ante Derek;John C. Mitchell;Dusko Pavlovic

  • Affiliations:
  • Standford University, CA;Standford University, CA;Standford University, CA;Kestrel Institute, CA

  • Venue:
  • Proceedings of the 2003 ACM workshop on Formal methods in security engineering
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

Modular composition of security mechanisms is complicated by the way that one mechanism may reveal information that interferes with the security of another. We develop methods for modular reasoning about security protocols, using before-after assertions and protocol invariants. The before-after assertions allow us to prove properties of a sequential composition of protocol steps and therefore enable construction of complex protocols from smaller sub-protocols. Invariants provide a mechanism for ensuring that sub-protocols which are individually secure do not interact insecurely when they are composed to construct a bigger protocol. The application of the method is demonstrated by giving modular formal proofs involving two standard protocols.