Journal article icon

Journal article

A framework for compositional verification of security protocols

Abstract:
Automatic security protocol analysis is currently feasible only for small protocols. Since larger protocols quite often are composed of many small protocols, compositional analysis is an attractive, but non-trivial approach. We have developed a framework for compositional analysis of a large class of security protocols. The framework is intended to facilitate automatic as well as manual verification of large structured security protocols. Our approach is to verify properties of component protocols in a multi-protocol environment, then deduce properties about the composed protocol. To reduce the complexity of multi-protocol verification, we introduce a notion of protocol independence and prove a number of theorems that enable analysis of independent component protocols in isolation. To illustrate the applicability of our framework to real-world protocols, we study a key establishment sequence in WiMax consisting of three subprotocols. Except for a small amount of trivial reasoning, the analysis is done using automatic tools.

Actions


Access Document


Publisher copy:
10.1016/j.ic.2007.07.002

Authors


More by this author
Institution:
University of Oxford
Division:
MPLS
Department:
Computer Science
Role:
Author


Journal:
Information and Computation More from this journal
Volume:
206
Issue:
2-4
Pages:
425-459
Publication date:
2006-11-14
DOI:
EISSN:
1090-2651
ISSN:
0890-5401


Language:
English
Keywords:
Pubs id:
pubs:427734
UUID:
uuid:da3719f0-7b83-4827-9c6b-df25847d4b70
Local pid:
pubs:427734
Source identifiers:
427734
Deposit date:
2013-11-16

Terms of use



Views and Downloads






If you are the owner of this record, you can report an update to it here: Report update to this record

TO TOP