[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2967973.2968609acmotherconferencesArticle/Chapter ViewAbstractPublication PagesppdpConference Proceedingsconference-collections
research-article
Public Access

Strand spaces with choice via a process algebra semantics

Published: 05 September 2016 Publication History

Abstract

Roles in cryptographic protocols do not always have a linear execution, but may include choice points causing the protocol to continue along different paths. In this paper we address the problem of representing choice in the strand space model of cryptographic protocols, particularly as it is used in the Maude-NPA cryptographic protocol analysis tool.
To achieve this goal, we develop and give formal semantics to a process algebra for cryptographic protocols that supports a rich taxonomy of choice primitives for composing strand spaces. In our taxonomy, deterministic and non-deterministic choices are broken down further. Non-deterministic choice can be either explicit, i.e., one of two paths is chosen, or implicit, i.e. the value of a variable is chosen non-deterministically. Likewise, deterministic choice can be either an (explicit) if-then-else choice, i.e. one path is chosen if a predicate is satisfied, while the other is chosen if it is not, or implicit deterministic choice, i.e. execution continues only if a certain pattern is matched. We have identified a class of choices which includes finite branching and some cases of infinite branching, which we address in this paper.
Our main theoretical results are two bisimulation results: one proving that the formal semantics of our process algebra is bisimilar to the forwards execution semantics of its associated strands, and another showing that it is also bisimilar with respect to the symbolic backwards semantics of the strands such as that supported by Maude-NPA. At the practical level, we present a prototype implementation of our process algebra in Maude-NPA, illustrate its expressive power and naturalness with various examples, and show how it can be effectively used in formal analysis.

References

[1]
Martín Abadi. Leslie lamport's properties and actions. In Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, PODC 2001, page 15, 2001.
[2]
Martín Abadi and Cédric Fournet. Mobile values, new names, and secure communication. In Conference Record of POPL 2001: The 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 104--115, 2001.
[3]
Iliano Cervesato, Nancy A. Durgin, John C. Mitchell, Patrick Lincoln, and Andre Scedrov. Relating strands and multiset rewriting for security protocol analysis. In Proceedings of the 13th IEEE Computer Security Foundations Workshop, CSFW '00, pages 35--51, 2000.
[4]
Federico Crazzolara and Glynn Winskel. Composing strand spaces. In FST TCS 2002: Foundations of Software Technology and Theoretical Computer Science, pages 97--108, 2002.
[5]
Cas Cremers, Marko Horval, Sam Scott, and Thyla van der Merwe. Automated analysis and verification of TLS 1.3:0-RTT, resumption and delayed authentication. In IEEE Security and Privacy, 2016, to appear: 2016.
[6]
Santiago Escobar, Catherine Meadows, and José Meseguer. Maude-NPA: Cryptographic protocol analysis modulo equational properties. In Foundations of Security Analysis and Design V, FOSAD 2007/2008/2009 Tutorial Lectures, LNCS vol. 5705, pages 1--50. Springer, 2009.
[7]
Santiago Escobar, Catherine Meadows, José Meseguer, and Sonia Santiago. A rewriting-based forwards semantics for Maude-NPA. In Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014. ACM, 2014.
[8]
Santiago Escobar, Catherine Meadows, José Meseguer, and Sonia Santiago. Symbolic protocol analysis with disequality constraints modulo equational theories. In Programming Languages with Applications to Biology and Security, pages 238--261, 2015.
[9]
F. J. Thayer Fabrega, J. Herzog, and J. Guttman. Strand Spaces: What Makes a Security Protocol Correct? Journal of Computer Security, 7:191--230, 1999.
[10]
Sibylle B. Fröschle. Adding branching to the strand space model. Electr. Notes Theor. Comput. Sci., 242(1):139--159, 2009.
[11]
Jean Goubault-Larrecq, Catuscia Palamidessi, and Angelo Troina. A probabilistic applied pi-calculus. In Programming Languages and Systems, 5th Asian Symposium, APLAS 2007, pages 175--190, 2007.
[12]
Simon Meier, Benedikt Schmidt, Cas Cremers, and David A. Basin. The TAMARIN prover for the symbolic analysis of security protocols. In Computer Aided Verification - 25th International Conference, CAV 2013, pages 696--701, 2013.
[13]
José Meseguer. Conditional rewriting logic as a united model of concurrency. Theor. Comput. Sci., 96(1):73--155, 1992.
[14]
Robin Milner. Communicating and mobile systems - the Pi-calculus. Cambridge University Press, 1999.
[15]
Carlos Olarte and Frank D. Valencia. The expressivity of universal timed CCP: undecidability of monadic FLTL and closure operators for security. In Proceedings Principles and Practice of Declarative Programming 2008, pages 8--19, 2008.
[16]
Eric Rescorla. The transport layer security (tls) protocol version 1.3. Technical Report draft-ietf-tls-tls13-12, IETF, 2016.

Cited By

View all
  • (2024)A Formally Verified Scheme for Security Protocols with the Operational Semantics of Strand SpaceTheoretical Aspects of Software Engineering10.1007/978-3-031-64626-3_18(306-323)Online publication date: 29-Jul-2024
  • (2022)UAV-VANET authentication for real-time highway surveillanceProceedings of the 37th ACM/SIGAPP Symposium on Applied Computing10.1145/3477314.3507021(1925-1931)Online publication date: 25-Apr-2022
  • (2021)Protocol Analysis with Time and SpaceProtocols, Strands, and Logic10.1007/978-3-030-91631-2_2(22-49)Online publication date: 19-Nov-2021
  • Show More Cited By
  1. Strand spaces with choice via a process algebra semantics

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    PPDP '16: Proceedings of the 18th International Symposium on Principles and Practice of Declarative Programming
    September 2016
    249 pages
    ISBN:9781450341486
    DOI:10.1145/2967973
    • Conference Chair:
    • James Cheney,
    • Program Chair:
    • Germán Vidal
    © 2016 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of the United States government. As such, the United States Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 05 September 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. cryptographic protocol analysis
    2. narrowing-based reachability analysis
    3. process algebra
    4. rewriting-based model checking

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    PPDP '16

    Acceptance Rates

    PPDP '16 Paper Acceptance Rate 17 of 37 submissions, 46%;
    Overall Acceptance Rate 230 of 486 submissions, 47%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)133
    • Downloads (Last 6 weeks)15
    Reflects downloads up to 30 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A Formally Verified Scheme for Security Protocols with the Operational Semantics of Strand SpaceTheoretical Aspects of Software Engineering10.1007/978-3-031-64626-3_18(306-323)Online publication date: 29-Jul-2024
    • (2022)UAV-VANET authentication for real-time highway surveillanceProceedings of the 37th ACM/SIGAPP Symposium on Applied Computing10.1145/3477314.3507021(1925-1931)Online publication date: 25-Apr-2022
    • (2021)Protocol Analysis with Time and SpaceProtocols, Strands, and Logic10.1007/978-3-030-91631-2_2(22-49)Online publication date: 19-Nov-2021
    • (2021)Secure Key Management Policies in Strand SpacesProtocols, Strands, and Logic10.1007/978-3-030-91631-2_10(175-197)Online publication date: 19-Nov-2021
    • (2020)Protocol Analysis with TimeProgress in Cryptology – INDOCRYPT 202010.1007/978-3-030-65277-7_7(128-150)Online publication date: 8-Dec-2020
    • (2019)Canonical Narrowing with Irreducibility Constraints as a Symbolic Protocol Analysis MethodFoundations of Security, Protocols, and Equational Reasoning10.1007/978-3-030-19052-1_4(15-38)Online publication date: 28-Apr-2019
    • (2018)Symbolic Reasoning Methods in Rewriting Logic and MaudeLogic, Language, Information, and Computation10.1007/978-3-662-57669-4_2(25-60)Online publication date: 27-Jun-2018
    • (2017)Automated Analysis of Equivalence Properties for Security Protocols Using Else BranchesComputer Security – ESORICS 201710.1007/978-3-319-66399-9_1(1-20)Online publication date: 12-Aug-2017

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media