Cryptographic Protocol Security Analysis Based on Trusted Freshness

"Cryptographic Protocol: Security Analysis Based on Trusted Freshness" mainly discusses how to analyze and design cryptographic protocols based on the idea of system engineering and that of the trusted freshness component. A novel freshness principle base

  • PDF / 3,568,786 Bytes
  • 379 Pages / 439 x 666 pts Page_size
  • 105 Downloads / 210 Views

DOWNLOAD

REPORT


Cryptographic Protocol Security Analysis Based on Trusted Freshness

Ling Dong Kefei Chen

Cryptographic Protocol Security Analysis Based on Trusted Freshness

With 185 figures

Authors Ling Dong Dept. of Computer Science and Engineering Shanghai Jiaotong University Shanghai, 200240, P.R. China E-mail: [email protected]

Kefei Chen Dept. of Computer Science and Engineering Shanghai Jiaotong University Shanghai, 200240, P.R. China E-mail: [email protected]

ISBN 978-7-04-031331-4 Higher Education Press, Beijing ISBN 978-3-642-24072-0 ISBN 978-3-642-24073-7 (eBook) Springer Heidelberg Dordrecht London New York Library of Congress Control Number: 2011937024 ¤ Higher Education Press, Beijing and Springer-Verlag Berlin Heidelberg 2012 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com)

Preface

A network protocol is a formal description of digital message formats, and of the rules for exchanging those messages in or between computing systems. A cryptographic protocol (also called a security protocol) is a kind of special network protocol that performs a security-related function and applies cryptographic methods. Network protocols are typically developed in layers, with each layer responsible for a different aspect of communication; the security mechanisms are therefore embedded in layers. For instance, Transport Layer Security (TLS) is a well-known cryptographic protocol proposed for adding security services to TCP. In fact, cryptographic protocols are widely used for key establishment, entity authentication, message authentication, and secure data transport, or non-repudiation methods. Due to the asynchronous nature of communication, although there are only a few messages in a cryptographic protocol, the protocol may not be as secure as intended. For example, the Needham-Schroeder public-key authentication protocol was found to be flawed in 1995, seventeen years after its publication. This book focuses on the security analysis of cryptographic protocols, introducing a novel idea for security analysis based on trusted freshness, and a formalism based on this freshness principle and beliefs multisets about security properties. It tries to