Security protocol design by composition

The aim of this research is to present a new methodology for the systematic de sign of compound protocols from their parts. Some security properties can be made accumulative, i.e. can be put together without interfering with one another, by carefully selecting the mechanisms which implement them. Am...

Full description

Bibliographic Details
Main Author: Choi, H.-J.
Published: University of Cambridge 2006
Subjects:
Online Access:http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.597633
id ndltd-bl.uk-oai-ethos.bl.uk-597633
record_format oai_dc
spelling ndltd-bl.uk-oai-ethos.bl.uk-5976332015-03-20T06:10:22ZSecurity protocol design by compositionChoi, H.-J.2006The aim of this research is to present a new methodology for the systematic de sign of compound protocols from their parts. Some security properties can be made accumulative, i.e. can be put together without interfering with one another, by carefully selecting the mechanisms which implement them. Among them are authentication, secrecy and non-repudiation. Based on this observation, a set of accumulative protocol mechanisms called <i>protocol primitives </i>are proposed and their correctness is verified. These protocol primitives are obtained from common mechanisms found in many security protocols such as challenge and response. They have been carefully designed not to interfere with each other. This feature makes them flexible building blocks in the proposed methodology. Equipped with these protocol primitives, a scheme for the systematic construction of a complicated protocol from simple protocol primitives is presented, namely, design by composition. This design scheme allows the combination of several simple protocol parts into a complicated protocol without destroying the security properties established by each independent part. In other words, the composition frame work permits the specification of a complex protocol to be decomposed into the specifications of simpler components, and thus makes the design and verification of the protocol easier to handle. Benefits of this approach are similar to those gained when using a modular approach to software development. The applicability and practicality of the proposed methodology are validated through many design examples of protocols found in many different environments and with various initial assumptions. The method is not aimed to cover all existent design issues, but a reasonable range of protocols is addressed.621.382University of Cambridgehttp://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.597633Electronic Thesis or Dissertation
collection NDLTD
sources NDLTD
topic 621.382
spellingShingle 621.382
Choi, H.-J.
Security protocol design by composition
description The aim of this research is to present a new methodology for the systematic de sign of compound protocols from their parts. Some security properties can be made accumulative, i.e. can be put together without interfering with one another, by carefully selecting the mechanisms which implement them. Among them are authentication, secrecy and non-repudiation. Based on this observation, a set of accumulative protocol mechanisms called <i>protocol primitives </i>are proposed and their correctness is verified. These protocol primitives are obtained from common mechanisms found in many security protocols such as challenge and response. They have been carefully designed not to interfere with each other. This feature makes them flexible building blocks in the proposed methodology. Equipped with these protocol primitives, a scheme for the systematic construction of a complicated protocol from simple protocol primitives is presented, namely, design by composition. This design scheme allows the combination of several simple protocol parts into a complicated protocol without destroying the security properties established by each independent part. In other words, the composition frame work permits the specification of a complex protocol to be decomposed into the specifications of simpler components, and thus makes the design and verification of the protocol easier to handle. Benefits of this approach are similar to those gained when using a modular approach to software development. The applicability and practicality of the proposed methodology are validated through many design examples of protocols found in many different environments and with various initial assumptions. The method is not aimed to cover all existent design issues, but a reasonable range of protocols is addressed.
author Choi, H.-J.
author_facet Choi, H.-J.
author_sort Choi, H.-J.
title Security protocol design by composition
title_short Security protocol design by composition
title_full Security protocol design by composition
title_fullStr Security protocol design by composition
title_full_unstemmed Security protocol design by composition
title_sort security protocol design by composition
publisher University of Cambridge
publishDate 2006
url http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.597633
work_keys_str_mv AT choihj securityprotocoldesignbycomposition
_version_ 1716796580254711808