Abstract
We use an enhanced operational semantics to infer quantitative measures on systems describing cryptographic protocols. System transitions carry enhanced labels. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of possibly different crypto-systems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools.
Supported in part by the EU IST-2001-32072 project DEGAS.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols - The Spi calculus. Information and Computation 148(1), 1–70 (1999)
Allen, A.A.: Probability, Statistics and Queueing Theory with Computer Science Applications. Academic Press, London (1978)
Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Riis Nielson, H.: Automatic validation of protocol narration. In: Proc. of CSFW 2003, pp. 126–140. IEEE, Los Alamitos (2003)
Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Riis Nielson, H.: Control Flow Analysis can find new flaws too. In: Proc. of Workshop on Issues in the Theory of Security (WITS 2004) (2004)
Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Riis Nielson, H.: Static validation of security protocos. To appear in Journal of Computer Securuty
Bodei, C., Buchholtz, M., Curti, M., Degano, P., Nielson, F., Riis Nielson, H., Priami, C.: Performance Evaluation of Security Protocols specified in Lysa. In: Proc. of (QAPL 2004). ENTCS, vol. 112 (2005)
Bodei, C., Curti, M., Degano, P., Priami, C.: A Quantitative Study of Two Attacks. In: Proc. of (WISP 2004). ENTCS, vol. 121 (2005)
Bravetti, M., Bernardo, M., Gorrieri, R.: Towards Performance Evaluation with General Distributions in Process Algebras. In: Sangiorgi, D., de Simone, R. (eds.) CONCUR 1998. LNCS, vol. 1466, pp. 405–422. Springer, Heidelberg (1998)
Buchholtz, M., Nielson, F., Riis Nielson, H.: A calculus for control flow analysis of security protocols. International Journal of Information Security 2(3-4) (2004)
Cervesato Fine-Grained, I.: MSR Specifications for Quantitative Security Analysis. In: Proc. of WITS 2004, pp. 111–127 (2004)
Clark, G.: Formalising the specifications of rewards with PEPA. In: Proc. of PAPM 1996, pp. 136–160. CLUT, Torino (1996)
Daemen, J., Rijndael, V.: The design of Rijndael. Springer, Heidelberg (2002)
Degano, P., Priami, C.: Non Interleaving Semantics for Mobile Processes. Theoretical Computer Science 216, 237–270 (1999)
Degano, P., Priami, C.: Enhanced Operational Semantics. ACM Computing Surveys 33(2), 135–176 (2001)
Diffie, W., Hellman, M.E.: New directions in Cryptography. IEEE Transactions on Information Theory IT-22(6), 644–654 (1976)
Dolev, D., Yao, A.: On the security of public key protocols. IEEE TIT IT-29(12), 198–208 (1983)
IEEE P1363 Standard Specification for Public-Key Cryptography (1999)
Hermanns, H., Herzog, U., Mertsiotakis, V.: Stochastic process algebras – between LOTOS and Markov Chains. Computer Networks and ISDN systems 30(9-10), 901–924 (1998)
Hillston, J.: A Compositional Approach to Performance Modelling. Cambridge University Press, Cambridge (1996)
Hodjat, A., Verbauwhede, I.: The Energy Cost of Secrets in Ad-hoc Networks. In: IEEE Circuits and Systems Workshop on Wireless Communications and Networking (2002)
Howard, R.: Dynamic Probabilistic Systems: Semi-Markov and Decision Systems, vol. II. Wiley, Chichester (1971)
Kohl, J.T., Clifford, B.C.: The Kerberos network authentication service (V5). The Internet Society (September 1993); RCF 1510
Meadows, C.: A cost-based framework for analysis of denial of service in networks. Journal of Computer Security 9(1/2), 143–164 (2001)
Milner, R., Parrow, J., Walker, D.: A calculus of mobile processes (I and II). Info. & Co. 100(1), 1–77 (1992)
Nelson, R.: Probability, Stochastic Processes and Queeing Theory. Springer, Heidelberg (1995)
Nottegar, C., Priami, C., Degano, P.: Performance Evaluation of Mobile Processes via Abstract Machines. Transactions on Software Engineering 27(10) (2001)
Otway, D., Rees, O.: Efficient and timely mutual authentication. ACM Operating Systems Review 21(1), 8–10 (1987)
Perrig, A., Song, D.: A First Step towards the Automatic Generation of Security Protocols. In: Proc. of Network and Distributed System Security Symposium (2000)
Plotkin, G.: A Structural Approach to Operational Semantics. Tech. Rep. Aarhus University, Denmark (1981); DAIMI FN-19
Priami, C.: Language-based Performance Prediction of Distributed and Mobile Systems. Information and Computation 175, 119–145 (2002)
Reibnam, A., Smith, R., Trivedi, K.: Markov and Markov reward model transient analysis: an overview of numerical approaches. European Journal of Operations Research 40, 257–267 (1989)
Stewart, W.J.: Introduction to the numerical solutions of Markov chains. Princeton University Press, Princeton (1994)
Trivedi, K.S.: Probability and Statistics with Reliability, Queeing and Computer Science Applications, Edgewood Cliffs, NY (1982)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bodei, C. et al. (2005). On Evaluating the Performance of Security Protocols. In: Malyshkin, V. (eds) Parallel Computing Technologies. PaCT 2005. Lecture Notes in Computer Science, vol 3606. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11535294_1
Download citation
DOI: https://doi.org/10.1007/11535294_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28126-9
Online ISBN: 978-3-540-31826-2
eBook Packages: Computer ScienceComputer Science (R0)