Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Update Semantics of Security Protocols

  • Published:
Synthese Aims and scope Submit manuscript

Abstract

We present a model-theoretic approach for reasoning about security protocols, applying recent insights from dynamic epistemic logics. This enables us to describe exactly the subsequent epistemic states of the agents participating in the protocol, using Kripke models and transitions between these based on updates of the agents’ beliefs associated with steps in the protocol. As a case study we will consider the SRA Three Pass protocol and discuss the Wide-Mouthed Frog protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • M. Abadi A. Gordon (1999) ArticleTitle‘A calculus for cryptographic protocols: The spi calculus’ Information and Computation 148 1–70 Occurrence Handle10.1006/inco.1998.2740

    Article  Google Scholar 

  • Abadi, M. and M. Tuttle: 1991, ‘A semantics for a logic of authentication’, in Proc. PODC’91, ACM, pp. 201–216.

  • Agray, N., W. van der Hoek, and E. P. de Vink: 2001, ‘On BAN logics for industrial security protocols’, in B. Dunin-Keplicz and E. Nawarecki, (eds.), From Theory to Practice in Multi-Agent Systems, LNAI 2296, pp. 29–38.

  • Anderson, R. J.: 2001, Security Engineering: A Guide to Building Dependable Distributed Systems, Wiley.

  • A. Baltag (2002) ArticleTitle‘A logic for suspicous players: Epistemic actions and belief-updates in games’ Bulletin of Economic Research 54 1–46 Occurrence Handle10.1111/1467-8586.00138

    Article  Google Scholar 

  • A. Baltag L. S. Moss (2004) ArticleTitle‘Logics for epistemic programs’, Synthese: Knowledge Rationality and Action 139 165–224

    Google Scholar 

  • Baltag, A., L. S. Moss, and S. Solecki: 1998, ‘The logic of public announcements, common knowledge and private suspicions’, in Itzhak Gilboa, (ed.), Proc. TARK’98, pp. 43–56.

  • Bleeker, A. and L. Meertens: 1997, ‘A semantics for BAN logic’, in Proceedings DIMACS Workshop on Design and Formal Verification of Protocols, DIMACS, Rutgers University, http://dimacs.rutgers.edu/Workshops/Security.

  • M. Burrows M. Abadi R. M. Needham (1990) ArticleTitle‘A logic of authentication’ ACM Transactions on Computer Systems 8 16–36 Occurrence Handle10.1145/77648.77649

    Article  Google Scholar 

  • Clark, J. A. and J. L Jacob: 1997, ‘A survey of authentication protocols 1.0’, Technical Report, University of York.

  • D. Dolev A. C. Yao (1983) ArticleTitle‘On the security of public-key protocols’ IEEE Transaction on Information Theory 29 198–208

    Google Scholar 

  • Gerbrandy, J.: 1997, ‘Dynamic epistemic logic’, Technical Report LP- 97–04, ILLC.

  • Gerbrandy, J.: 1999, ‘Bisimulations on Planet Kripke’, PhD thesis, ILLC Dissertation Series 1999–01, University of Amsterdam.

  • Hommersom, A. J.: 2003, ‘Reasoning about security’, Master’s thesis, Universiteit Utrecht.

  • Kessler, V. and H. Neumann: 1998, ‘A sound logic for analyzing electronic commerce protocols’, in J. -J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollman (eds.), Proc. ESORICS’98, LNCS 1485, pp. 345–360.

  • Kooi, B.: 2003, ‘Knowledge, Chance, and Change’, PhD thesis, ILLC Dissertation Series 2003–01, University of Groningen.

  • G. Lowe (1996) ArticleTitle‘Breaking and fixing the Needham-Schroeder public-key protocol using FDR’ Software - Concepts and Tools 17 93–102

    Google Scholar 

  • Roorda, J.-W., W. van der Hoek, and J.-J. Ch Meyer: 2002, ‘Iterated belief change in multi-agent systems’, in Proceedings of the First International Joint Conference on Autonomous Agents and Multi-Agent Systems: Part 2.

  • Schneier, B.: 2000, Secrets and Lies: Digital Security in a Networked World, Wiley.

  • S. G. Stubblebine R. N. Wright (2002) ArticleTitle‘An authentication logic with formal semantics supporting synchronization, revocation and recency’ IEEE Transactions on Software Engineering 28 256–285 Occurrence Handle10.1109/32.991320

    Article  Google Scholar 

  • van Ditmarsch, H. P.: 2000, ‘Knowledge games’, PhD thesis, ILLC Dissertation Series 2000–06, University of Groningen.

  • van Ditmarsch, H. P.: 2001, ‘The semantics of concurrent knowledge actions’, in M. Pauly and G. Sandu, (eds.), Proc. ESSLLI Workshop on Logic and Games, Helsinki.

  • Wedel, G. and V. Kessler: 1996, ‘Formal semantics for authentication logics’, in E. Bertino, H. Kurth, G. Martello, and E. Montolivo, (eds.), Proc. ESORICS’96, LNCS 1146, pp. 219–241.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arjen Hommersom.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hommersom, A., Meyer, Jj. & De vink, E. Update Semantics of Security Protocols. Synthese 142, 229–267 (2004). https://doi.org/10.1007/s11229-004-2247-0

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11229-004-2247-0

Keywords