• Media type: Report; E-Book
  • Title: Developing Security Protocols by Refinement
  • Contributor: Basin, David A. [Author]; Sprenger, Christoph [Author]
  • Published: ETH, Department of Computer Science, Institute of Information Security, 2013
  • Published in: Technical Report / ETH Zurich, Department of Computer Science, 787
  • Language: English
  • DOI: https://doi.org/20.500.11850/67931; https://doi.org/10.3929/ethz-a-009900739
  • Keywords: Data processing ; Entity authentication ; NETZWERKPROTOKOLLE + KOMMUNIKATIONSPROTOKOLLE (COMPUTERSYSTEME) ; DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) ; Stepwise refinement ; NETWORK PROTOCOLS + COMMUNICATION PROTOCOLS (COMPUTER SYSTEMS) ; Key establishment ; Security protocols ; Correct-by-construction development ; DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS) ; computer science
  • Origination:
  • University thesis:
  • Footnote: Diese Datenquelle enthält auch Bestandsnachweise, die nicht zu einem Volltext führen.
  • Description: We propose a development method for security protocols based on stepwise refinement. Our refinement strategy transforms abstract security goals into protocols that are secure when operating over an insecure channel controlled by a Dolev-Yao-style intruder. As intermediate levels of abstraction, we employ message-less guard protocols and channel protocols communicating over channels with security properties. These abstractions provide insights on why the protocols are secure and foster the development of families of protocols sharing common structure and properties. We have implemented our method in Isabelle/HOL and used it to develop different entity authentication and key establishment protocols. These protocols include realistic features such as key confirmation, replay caches, and encrypted tickets. Our development highlights that guard protocols and channel protocols provide fundamental abstractions for bridging the gap between security properties and standard protocol descriptions based on cryptographic messages. It also shows that our refinement approach scales to protocols of nontrivial size and complexity.
  • Access State: Open Access
  • Rights information: In Copyright - Non-commercial Use Permitted