An authentication logic supporting synchronization, revocation, and recency

Distributed systems inherently involve dynamic changes to the value of security attributes such as the goodness of encryption keys. Since concurrent knowledge is usually infeasible or impractical, it is often necessary for the participants of distributed protocols to determine and act on beliefs that may not be supported by the current state of the system. Policies for determining beliefs in such situations can range from extremely conservative, such as only believing statements if they are very recent, to extremely optimistic, such as believing all statements that are not yet known to be revoked. Such security policies often are heavily dependent on timing of received messages and on synchronization between principals. We present a. logic for analyzing cryptographic protocols that has the capability to specify time and synchronization details. This capability considerably advances the scope of known techniques for both expressing practical authentication policies of protocol participants as constraints, and for reasoning about protocol goals subject to these constraints. In the course of reasoning about protocol goals, one is able to deduce requirements for trust between protocol participants, synchronization between protocol participants, and timeliness of message contents. Our logic is flexible, and can support a wide range of security policies. The ability to reason about the conjunction of individual participant policies and protocols will be especially important as public and private key infrastructures are deployed and new and unanticipated policies are put into use.

[1]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[2]  Li Gong,et al.  Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[3]  Mark R. Tuttle,et al.  A Semantics for a Logic of Authentication , 1991, PODC 1991.

[4]  Yoram Moses,et al.  Knowledge, Timed Precedence and Clocks , 1995, PODC 1995.

[5]  Paul F. Syverson,et al.  On unifying some cryptographic protocol logics , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[6]  Stuart G. Stubblebine,et al.  Recent-secure authentication: enforcing revocation in distributed systems , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.

[7]  Ronald Fagin,et al.  Reasoning about knowledge , 1995 .

[8]  B. Lampson,et al.  Authentication in distributed systems: theory and practice , 1991, TOCS.

[9]  Butler W. Lampson,et al.  Authentication in distributed systems , 1993 .

[10]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[11]  Martín Abadi,et al.  A Calculus for Access Control in Distributed Systems , 1991, CRYPTO.

[12]  Paul F. Syverson Adding time to a logic of authentication , 1993, CCS '93.

[13]  Martín Abadi,et al.  A semantics for a logic of authentication (extended abstract) , 1991, PODC '91.