Article de revue (2004)
Document en libre accès dans PolyPublie et chez l'éditeur officiel |
|
Libre accès au plein texte de ce document Version officielle de l'éditeur Conditions d'utilisation: Tous droits réservés Télécharger (522kB) |
Abstract
The specification and validation of security protocols often requires viewing function calls - like encryption/decryption and the generation of fake messages explicitly as actions within the process semantics. Following this approach, this paper introduces a symbolic framework based on value-passing processes able to handle symbolic values like fresh nonces, fresh keys, fake addresses and fake messages. The main idea in our approach is to assign to each value-passing process a formula describing the symbolic values conveyed by its semantics. In such symbolic processes, called constrained processes, the formulas are drawn from a logic based on a message algebra equipped with encryption, signature and hashing primitives. The symbolic operational semantics of a constrained process is then established through semantic rules updating formulas by adding restrictions over the symbolic values, as required for the process to evolve. We then prove that the logic required from the semantic rules is decidable. We also define a bisimulation equivalence between constrained processes; this amounts to a generalisation of the standard bisimulation equivalence between (non-symbolic) value-passing processes. Finally, we provide a complete symbolic bisimulation method for constructing the bisimulation between constrained processes.
Mots clés
bisimulation, equivalence-checking, formal methods, noninterference, process algebra, protocols, symbolic
Sujet(s): |
2700 Technologie de l'information > 2700 Technologie de l'information 2700 Technologie de l'information > 2713 Algorithmes |
---|---|
Département: | Département de génie informatique et génie logiciel |
URL de PolyPublie: | https://publications.polymtl.ca/3383/ |
Titre de la revue: | Journal of Universal Computer Science (vol. 10, no 9) |
Maison d'édition: | J.UCS Consortium |
DOI: | 10.3217/jucs-010-09-1156 |
URL officielle: | https://doi.org/10.3217/jucs-010-09-1156 |
Date du dépôt: | 17 janv. 2019 15:19 |
Dernière modification: | 03 oct. 2024 19:09 |
Citer en APA 7: | Lafrance, S. (2004). Symbolic approach to the analysis of security protocols. Journal of Universal Computer Science, 10(9), 1156-1198. https://doi.org/10.3217/jucs-010-09-1156 |
---|---|
Statistiques
Total des téléchargements à partir de PolyPublie
Téléchargements par année
Provenance des téléchargements
Dimensions