Modelling unbounded parallel sessions of security protocols in CSP

We show that a simplification to earlier CSP models designed to prove protocols correct on the FDR model checker is valid. This both allows us to extend the scope of our proofs and produce checks that are enormously more efficient.

[1]  Gavin Lowe,et al.  Towards a completeness result for model checking of security protocols , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).

[2]  Gavin Lowe Casper: a compiler for the analysis of security protocols , 1998 .

[3]  A. W. Roscoe,et al.  Automating Data Independence , 2000, ESORICS.

[4]  Ios Press Embedding agents within the intruder to detect parallel attacks , 2004 .

[5]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[6]  C. A. R. Hoare,et al.  Communicating sequential processes , 1978, CACM.

[7]  A. W. Roscoe,et al.  On the Relationship Between Web Services Security and Traditional Protocols , 2005, MFPS.

[8]  Dawn Xiaodong Song,et al.  Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis , 2001, J. Comput. Secur..

[9]  Philippa J. Hopcroft Data independence in the model checking of security protocols , 2001 .

[10]  A. W. Roscoe,et al.  Proving security protocols with model checkers by data independence techniques , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).

[11]  Andrew William Roscoe,et al.  The Theory and Practice of Concurrency , 1997 .

[12]  Scott D. Stoller Justifying Finite Resources for Adversaries in Automated Analysis of Authentication Protocols , 2007 .

[13]  Gavin Lowe,et al.  Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.

[14]  Michael Goldsmith The perfect spy for model−checking crypto−protocols , 1997 .

[15]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[16]  Gavin Lowe,et al.  Analysing a stream authentication protocol using model checking , 2002, International Journal of Information Security.

[17]  Bruno Blanchet,et al.  An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[18]  Michael Goldsmith,et al.  Modelling and analysis of security protocols , 2001 .

[19]  Natsume Matsuzaki,et al.  Key Distribution Protocol for Digital Mobile Communication Systems , 1989, CRYPTO.

[20]  Gavin Lowe,et al.  A hierarchy of authentication specifications , 1997, Proceedings 10th Computer Security Foundations Workshop.

[21]  F. Javier Thayer Fábrega,et al.  Strand spaces: proving security protocols correct , 1999 .