Skip to main content

2017 | OriginalPaper | Buchkapitel

Timed Analysis of Security Protocols

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper presents some remarks on the analysis of security protocols taking into account their time properties. Usually untimed or timed protocols are investigated with security properties, such as the secrecy of some data or the allowance of mutual authentication. These properties are independent of time. In this paper we investigate different executions, sometimes executed simultaneously, of a protocol and different types of times: ciphering and deciphering time, step execution time, whole protocol execution time, and delays in the network. Taking this into account we can investigate how these times can be chosen regardless of the possibility of an attack execution. As part of the work we have implemented a tool that helps us in the mentioned work and allows to present some experimental results.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Armando, A., et. al.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Proceedings of 17th International Conference on Computer Aided Verification (CAV’05), vol. 3576 of LNCS, pp. 281–285, Springer, Berlin (2005) Armando, A., et. al.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Proceedings of 17th International Conference on Computer Aided Verification (CAV’05), vol. 3576 of LNCS, pp. 281–285, Springer, Berlin (2005)
2.
Zurück zum Zitat Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18–36 (1990)CrossRefMATH Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18–36 (1990)CrossRefMATH
3.
Zurück zum Zitat Cremers, C.: The Scyther tool: verification, falsification, and analysis of security protocols. In: Proceedings of the 20th International Conference on Computer Aided Verification, Princeton, USA, pp. 414–418 (2008) Cremers, C.: The Scyther tool: verification, falsification, and analysis of security protocols. In: Proceedings of the 20th International Conference on Computer Aided Verification, Princeton, USA, pp. 414–418 (2008)
5.
Zurück zum Zitat Jakubowska, G., Penczek, W.: Modeling and checking timed authentication security protocols. In: Proceedings of the International Workshop on Concurrency, Specification and Programming (CS&P’Z06), Informatik-Berichte 206(2), str. 280–291, Humboldt University (2006) Jakubowska, G., Penczek, W.: Modeling and checking timed authentication security protocols. In: Proceedings of the International Workshop on Concurrency, Specification and Programming (CS&P’Z06), Informatik-Berichte 206(2), str. 280–291, Humboldt University (2006)
6.
Zurück zum Zitat Jakubowska, G., Penczek, W.: Is your security protocol on time? In: Proceedings of FSEN’07, vol. 4767 of LNCS, pp. 65–80. Springer, Berlin (2007) Jakubowska, G., Penczek, W.: Is your security protocol on time? In: Proceedings of FSEN’07, vol. 4767 of LNCS, pp. 65–80. Springer, Berlin (2007)
7.
Zurück zum Zitat Kurkowski, M., Penczek, W.: Applying timed automata to model checking of security protocols. In: Wang, J. (ed.) Handbook of Finite State Based Models and Applications, pp. 223–254. CRC Press, Boca Raton (2012) Kurkowski, M., Penczek, W.: Applying timed automata to model checking of security protocols. In: Wang, J. (ed.) Handbook of Finite State Based Models and Applications, pp. 223–254. CRC Press, Boca Raton (2012)
8.
Zurück zum Zitat Kurkowski M.: Formalne metody weryfikacji wlasnosci protokolow zabezpieczajacych w sieciach komputerowych, wyd. Exit, Warszawa (2013) Kurkowski M.: Formalne metody weryfikacji wlasnosci protokolow zabezpieczajacych w sieciach komputerowych, wyd. Exit, Warszawa (2013)
9.
Zurück zum Zitat Kurkowski, M., Grosser, A., Piatkowski, J., Szymoniak, S.: ProToc—an universal language for security protocols specification. Adv. Intell. Syst. Comput. 342, 237–248 (2015) Kurkowski, M., Grosser, A., Piatkowski, J., Szymoniak, S.: ProToc—an universal language for security protocols specification. Adv. Intell. Syst. Comput. 342, 237–248 (2015)
10.
Zurück zum Zitat Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM 21(12), 993–999 (1978)CrossRefMATH Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM 21(12), 993–999 (1978)CrossRefMATH
11.
Zurück zum Zitat Paulson L.: Inductive analysis of the internet protocol TLS, TR440, University of Cambridge, Computer Laboratory (1998) Paulson L.: Inductive analysis of the internet protocol TLS, TR440, University of Cambridge, Computer Laboratory (1998)
12.
Zurück zum Zitat Szymoniak, S., Kurkowski, M., Piatkowski, J.: Timed models of security protocols including delays in the network. J. Appl. Math. Comput. Mech. 14(3), 127–139 (2015)CrossRef Szymoniak, S., Kurkowski, M., Piatkowski, J.: Timed models of security protocols including delays in the network. J. Appl. Math. Comput. Mech. 14(3), 127–139 (2015)CrossRef
Metadaten
Titel
Timed Analysis of Security Protocols
verfasst von
Sabina Szymoniak
Olga Siedlecka-Lamch
Mirosław Kurkowski
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-46586-9_5