×

Verification of authentication protocols based on the binding relation. (English) Zbl 1033.94558

Okada, Mitsuhiro (ed.) et al., Software security – theories and systems. Mext-NSF-JSPS international symposium, ISSS 2002, Tokyo, Japan, November 8–10, 2002. Revised papers. Berlin: Springer (ISBN 3-540-00708-3/pbk). Lect. Notes Comput. Sci. 2609, 299-316 (2003).
Summary: The correctness of an authentication protocol is based on, among other things, the relation between nonces and data that is established in the course of execution of the protocol. In this paper, we formulate an inference system that derives the secrecy of nonces and the relation that binds nonces and data. It is easy to show the correctness of a protocol by directly deriving the binding relation using the inference rules. Depending on situations, it is also possible to extend the inference system by simply adding new inference rules. We give some example protocols whose correctness can only be shown using some conditions on nonces that are formulated as additional inference rules.
For the entire collection see [Zbl 1017.00039].

MSC:

94A62 Authentication, digital signatures and secret sharing
68P25 Data encryption (aspects in computer science)

Software:

TAPS