Ðð Blockinøöóòò Aeóøø× Ò Ìììóööøø Blockin Blockinð Óñôùøøö Ë Blockin

Abstract Woo and Lam propose correspondence assertions for specifying authenticity properties of security protocols. The only prior work on checking correspondence assertions depends on model-checking and is limited to finite-state systems. We propose a dependent type and effect system for checking correspondence assertions. Since it is based on type-checking, our method is not limited to finite-state systems. This paper presents our system in the simple and general setting of the π-calculus. We show how to type-check correctness properties of example communication protocols based on secure channels. In a related paper, we extend our system to the more complex and specific setting of checking cryptographic protocols based on encrypted messages sent over insecure channels.

[1]  Andrew D. Gordon,et al.  A Concurrent Object Calculus: Reduction and Typing , 1998, HLCL.

[2]  Gérard Berry,et al.  The chemical abstract machine , 1989, POPL '90.

[3]  Naoki Kobayashi A partially deadlock-free typed process calculus , 1998, TOPL.

[4]  Scott F. Smith,et al.  Static enforcement of security with types , 2000, ICFP '00.

[5]  Vasco Thudichum Vasconcelos,et al.  Language Primitives and Type Discipline for Structured Communication-Based Programming Revisited: Two Systems for Higher-Order Session Communication , 1998, SecReT@ICALP.

[6]  Bengt Nordström,et al.  Programming in Martin-Lo¨f's type theory: an introduction , 1990 .

[7]  Nobuko Yoshida,et al.  Secure Information Flow as Typed Process Behaviour , 2000, ESOP.

[8]  David K. Gifford,et al.  Integrating functional and imperative programming , 1986, LFP '86.

[9]  Simon S. Lam,et al.  A semantic model for authentication protocols , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[10]  Kohei Honda,et al.  An Interaction-based Language and its Typing System , 1994, PARLE.

[11]  Somesh Jha,et al.  Model Checking for Security Protocols , 1997 .

[12]  F. Nielson,et al.  From CML to process Algebras , 1993 .

[13]  Martín Abadi,et al.  Object Types against Races , 1999, CONCUR.

[14]  James Riely,et al.  Resource Access Control in Systems of Mobile Agents , 2002, Inf. Comput..

[15]  Atsushi Igarashi,et al.  A generic type system for the Pi-calculus , 2001, POPL '01.

[16]  Gene Tsudik,et al.  Di e-hellman key distribution extended to groups , 1996, CCS 1996.

[17]  Sagar Chaki,et al.  Types as models: model checking message-passing programs , 2002, POPL '02.

[18]  Robin Milner,et al.  Communicating and mobile systems - the Pi-calculus , 1999 .

[19]  Andrew D. Gordon,et al.  Typing correspondence assertions for communication protocols , 2003, Theor. Comput. Sci..

[20]  Dal ZilioSilvano,et al.  Region analysis and a -calculus with groups , 2002 .

[21]  Davide Sangiorgi,et al.  Communicating and Mobile Systems: the π-calculus, , 2000 .

[22]  Gene Tsudik,et al.  CLIQUES: a new approach to group key agreement , 1998, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183).

[23]  Davide Sangiorgi,et al.  Typing and subtyping for mobile processes , 1993, [1993] Proceedings Eighth Annual IEEE Symposium on Logic in Computer Science.

[24]  Flemming Nielson,et al.  Higher-order concurrent programs with finite communication topology (extended abstract) , 1994, POPL '94.

[25]  Martín Abadi,et al.  A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.

[26]  Joannes M. Lucassen Types and Effects Towards the Integration of Functional and Imperative Programming. , 1987 .

[27]  Mads Tofte,et al.  Region-based Memory Management , 1997, Inf. Comput..

[28]  Martín Abadi,et al.  A Calculus for Cryptographic Protocols: The spi Calculus , 1999, Inf. Comput..

[29]  David Walker,et al.  Typed memory management in a calculus of capabilities , 1999, POPL '99.

[30]  James Riely,et al.  Resource Access Control in Systems of Mobile Agents , 2002, HLCL.

[31]  Andrew D. Gordon,et al.  Authenticity by typing for security protocols , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[32]  Gavin Lowe,et al.  A hierarchy of authentication specifications , 1997, Proceedings 10th Computer Security Foundations Workshop.

[33]  Andrew D. Gordon,et al.  Region analysis and a pi-calculus with groups , 2002, J. Funct. Program..

[34]  Andrew D. Gordon,et al.  Types and effects for asymmetric cryptographic protocols , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.