Injective synchronisation: an extension of the authentication hierarchy

  • Authors:
  • C. J. F. Cremers;S. Mauw;E. P. de Vink

  • Affiliations:
  • Department of Mathematics and Computer Science, Eindhoven University of Technology, MB Eindhoven, The Netherlands;Department of Mathematics and Computer Science, Eindhoven University of Technology, MB Eindhoven, The Netherlands;Department of Mathematics and Computer Science, Eindhoven University of Technology, MB Eindhoven, The Netherlands and LIACS, Leiden University, Niels Bohrweg, CA Leiden, The Netherlands

  • Venue:
  • Theoretical Computer Science - Automated reasoning for security protocol analysis
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Authentication is one of the foremost goals of many security protocols. It is most often formalised as a form of agreement, which expresses that the communicating partners agree on the values of a number of variables. In this paper we formalise and study an intensional form of authentication which we call synchronisation. Synchronisation expresses that the messages are transmitted exactly as prescribed by the protocol description. Synchronisation is a strictly stronger property than agreement for the standard intruder model, because it can be used to detect preplay attacks. In order to prevent replay attacks on simple protocols, we also define injective synchronisation. Given a synchronising protocol, we show that a sufficient syntactic criterion exists that guarantees that the protocol is injective as well.