A simple process calculus for the analysis of security protocols

被引:0
|
作者
Gu, YG [1 ]
Fu, YX [1 ]
Li, GQ [1 ]
机构
[1] Shanghai Jiao Tong Univ, BASICS, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
关键词
security protocol; formal method; process calculus; security property;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The spi calculus has been proved useful for reasoning about security protocols. It is however difficult to mechanize the equivalence checking in that framework due to the complexity caused by name passing communications. The paper proposes a calculus for the analysis of the security protocols (SPC for short) as a simplification of the spi calculus. SPC can explicitly express environment knowledge, protocol participants and their knowledge. We present its syntax and semantics, and specify some security properties in terms of equivalence relations. Finally two examples of formal verification is given.
引用
收藏
页码:110 / 114
页数:5
相关论文
共 50 条
  • [1] A Calculus for the Analysis of Wireless Network Security Protocols
    Ballardin, Francesco
    Merro, Massimo
    FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 206 - 222
  • [2] A calculus for control flow analysis of security protocols
    Mikael Buchholtz
    Hanne Riis Nielson
    Flemming Nielson
    International Journal of Information Security, 2004, 2 (3-4) : 145 - 167
  • [3] Process Calculus and Horn Clauses-Based Deduction in the Verification of Security Protocols
    Nguyen Truong Thang
    Khuat Thanh Son
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (05): : 11 - 17
  • [4] A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols
    Mitchell, JC
    Ramanathan, A
    Scedrov, A
    Teague, V
    THEORETICAL COMPUTER SCIENCE, 2006, 353 (1-3) : 118 - 164
  • [5] A Study of Process Calculus for Formal Verification and Analysis of Security Protocol
    Irfan, Annie
    Gaur, Manish
    Tripathi, Surya Prakash
    PROCEEDINGS OF THE 2018 4TH INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT - 2018), 2018, : 119 - 124
  • [6] LπCET: A Logic Security Analysis for Cryptographic Protocols Based on π-Calculus Extension Theory
    Wu, Fusheng
    Liu, Jinhui
    Li, Yanbin
    Ni, Mingtao
    IET INFORMATION SECURITY, 2024, 2024
  • [7] Probabilistic polynomial-time process calculus and security protocol analysis
    Mitchell, JC
    PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2001, 2028 : 23 - 29
  • [8] Formal analysis of security protocol based on process calculus and knowledge derivation
    Department of Computer Science and Technology, Huzhou Teachers College, Huzhou 313000, China
    不详
    Jisuanji Yanjiu yu Fazhan, 2006, 5 (953-958):
  • [9] Analysis of security protocols
    Durgin, NA
    Mitchell, JC
    CALCULATIONAL SYSTEM DESIGN, 1999, 173 : 369 - 394
  • [10] Security analysis of Bluetooth Secure Simple Pairing protocols with extended threat model
    Yin, Haotian
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 72