Game Semantics for the Specification and Analysis of Security Protocols

preview-18
  • Game Semantics for the Specification and Analysis of Security Protocols Book Detail

  • Author : Mohamed Saleh
  • Release Date : 2008
  • Publisher :
  • Genre :
  • Pages : 0
  • ISBN 13 :
  • File Size : 77,77 MB

Game Semantics for the Specification and Analysis of Security Protocols by Mohamed Saleh PDF Summary

Book Description: Security protocols are communication protocols that are used when agents communicate sensitive information in hostile environments. They are meant to achieve security goals such as the secrecy of a piece of communicated information or the authenticity of an agent's identity. Their two main characteristics are the use of cryptographic operations such as encryption or digital signatures and the assumption that communication takes place in the presence of a malicious intruder. It is therefore necessary to make sure that the protocol design is correct and will thus achieve its security goals even when under attack by the intruder. Design verification for security protocols is no easy task; a successful attack on the Needham-Shroeder authentication protocol was discovered 17 years after the protocol had been published. We present a, framework for the specification and analysis of security protocols. The specification language is close to the standard "arrow" notation used by protocol designers and practitioners, however, we add some constructs to declare persistent and fresh knowledge for agents. The analysis that we conduct consists of two stages: Modeling and verification. The model we use for protocols is based on game-semantics, in which the emphasis is put on interaction. The protocol is modeled as a game between the intruder and agents. Verification amounts to finding successful strategies for either the agent or the intruder. For instance, if the protocol goal is to achieve fairness in exchanges between possibly cheating agents, then the verification algorithm searches the game tree to insure that each non-cheating agent is not put at a disadvantage with respect to other agents. In order to he able to specify a wide range of security properties of strategies, we propose a logic having modal, temporal and linear characteristics. The logic is also equipped with a tableau-based proof system that serves as a basis for a model checking algorithm. To validate our approach, we designed and implemented a software environment that verifies protocol specifications against required properties. We use this environment to conduct case studies.

Disclaimer: www.yourbookbest.com does not own Game Semantics for the Specification and Analysis of Security Protocols books pdf, neither created or scanned. We just provide the link that is already available on the internet, public domain and in Google Drive. If any way it violates the law or has any issues, then kindly mail us via contact us page to request the removal of the link.

Formal Methods and Software Engineering

Formal Methods and Software Engineering

File Size : 86,86 MB
Total View : 3122 Views
DOWNLOAD

This book constitutes the refereed proceedings of the 7th International Conference on Formal Engineering Methods, ICFEM 2005, held in Manchester, UK in November

Foundations of Security Analysis and Design

Foundations of Security Analysis and Design

File Size : 71,71 MB
Total View : 2030 Views
DOWNLOAD

Security is a rapidly growing area of computer science, with direct and increasing relevance to real life applications such as Internet transactions, electronic

Decision and Game Theory for Security

Decision and Game Theory for Security

File Size : 59,59 MB
Total View : 6267 Views
DOWNLOAD

The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions.Among the topical areas covered were: