Formal Design Framework of the Authentication Property

Article Preview

Abstract:

A framework to design the authentication property is presented in this paper. The framework designs the message structures which are used to formally express the authentication goal. These structures guarantee the authentication property. The dynamic characteristics of security property are added to the process of design through the trace-model. The design principles for avoiding the attack on the authentication property are discussed and formalized into inference rules. This method is proved to be valid.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3637-3641

Citation:

Online since:

May 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] M. Bugliesi, R. Focardi, and M. Maffei. Principles for entity authentication. In Proceedings of 5th International Conference Perspectives of System Instructureics (PSI 2003), volume 2890, pages 294–307, July (2003).

Google Scholar

[2] Paul Syverson, Iliano Cervesato. The Logic of Authentication Protocols. In Foundations of SecurityAnalysis and Design, LNCS 2171, pages 63-136. Springer-Verlag, (2001).

Google Scholar

[3] Joshua D. Guttman. Security Protocol Design via Authentication Tests. Proc. of the 2002 IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE Computer Society Press, 2002. p.92−103.

DOI: 10.1109/csfw.2002.1021809

Google Scholar

[4] Martin Abadi. Security Protocols and their Properties. In Foundations of Secure Computation (F.L. Bauer and R. Steinbrueggen, eds. ), NATO Science Series, IOS Press (2000), pages 39-60.

Google Scholar

[5] D. Dolev and A. Yao. On the security of public-key protocols. IEEE Transactions on Instructureion Theory, 29: 198–208, (1983).

DOI: 10.1109/tit.1983.1056650

Google Scholar

[6] T. Y. C. Woo and S. S. Lam. Authentication for distributed systems. In Computer, volume 25, pages 39-52, January (1992).

Google Scholar

[7] M. Burrows, M. Abadi, and R. Needham, A logic of authentication, ACM Transactions on Computer Systems, Feb 1990, 8(1): 18-36.

DOI: 10.1145/77648.77649

Google Scholar

[8] M. Boreale. Symbolic trace analysis of cryptographic protocols In Proceedings of ICALP 01. volume 2076, pages 667-681. LNCS 2076, Springer Verlag, (2001).

Google Scholar