A comparison between strand spaces and multiset rewriting for security protocol analysis

  • Authors:
  • Iliano Cervesato;Nancy A. Durgin;Patrick D. Lincoln;John C. Mitchell;Andre Scedrov

  • Affiliations:
  • Advanced Engineering and Sciences Division, ITT Industries, Inc., Alexandria, VA;Sandia National Laboratories, Livermore, CA;Computer Science Laboratory, SRI International, Menlo Park, CA;Computer Science Department, Stanford University, Stanford, CA;Mathematics Department, University of Pennsylvania Philadelphia, PA

  • Venue:
  • Journal of Computer Security
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Formal analysis of security protocols is largely based on a set of assumptions commonly referred to as the Dolev-Yao model. Two formalisms that state the basic assumptions of this model are related here: strand spaces and multiset rewriting with existential quantification. Strand spaces provide a simple and economical approach to analysis of completed protocol runs by emphasizing causal interactions among protocol participants. The multiset rewriting formalism provides a very precise way of specifying finite-length protocols with unboundedly many instances of each protocol role, such as client, server, initiator, or responder. A number of modifications to each system are required to produce a meaningful comparison. In particular, we extend the strand formalism with a way of incrementally growing bundles in order to emulate an execution of a protocol with parametric strands. The correspondence between the modified formalisms directly relates the intruder theory from the multiset rewriting formalism to the penetrator strands. The relationship we illustrate here between multiset rewriting specifications and strand spaces thus suggests refinements to both frameworks, and deepens our understanding of the Dolev-Yao model.