@article{ART002537526},
author={Lee Gye-Sik},
title={Formal Specification of Cryptographic Security Protocols},
journal={Journal of Knowledge Information Technology and Systems},
issn={1975-7700},
year={2019},
volume={14},
number={6},
pages={711-718},
doi={10.34163/jkits.2019.14.6.014}
TY - JOUR
AU - Lee Gye-Sik
TI - Formal Specification of Cryptographic Security Protocols
JO - Journal of Knowledge Information Technology and Systems
PY - 2019
VL - 14
IS - 6
PB - Korea Knowledge Information Technology Society
SP - 711
EP - 718
SN - 1975-7700
AB - We introduce a way of formal specification of cryptographic security protocols. We demonstrate how to use formal methods in verifying cryptographic security protocols. Each step of the verification is explained with a concrete example, the Needham-Schroeder public-key protocol. The style of describing the syntax is similar to that of the tool Scyther. It is simple and intuitive to use for the specification of security protocols. Our description corresponds also to the basic concepts of the tool ProVerif. Specifications of cryptographic security protocols are represented at the most abstract level: Messages are terms constructed from symbols and the attacker is modeled as a formal process. A formal language L = (V, C, R, F) for public-key protocols consists of a set V of variables for received messages, a set C of local constant symbols, a set R of role name symbols, and a set F of function symbols. Then a protocol describes the behavior of each of the roles such as initiator, responder, key server, etc. In the specification, the behavior of each role is formalized as a transition system describing how to create messages, how to react to the received messages, and how to manipulate messages. Among many security properties, we illustrate how to formally handle secrecy and authentication.
KW - Cryptographic security protocols;Formal specifications;Automatic verification;Formal methods;Scyther;ProVerif
DO - 10.34163/jkits.2019.14.6.014
ER -
Lee Gye-Sik. (2019). Formal Specification of Cryptographic Security Protocols. Journal of Knowledge Information Technology and Systems, 14(6), 711-718.
Lee Gye-Sik. 2019, "Formal Specification of Cryptographic Security Protocols", Journal of Knowledge Information Technology and Systems, vol.14, no.6 pp.711-718. Available from: doi:10.34163/jkits.2019.14.6.014
Lee Gye-Sik "Formal Specification of Cryptographic Security Protocols" Journal of Knowledge Information Technology and Systems 14.6 pp.711-718 (2019) : 711.
Lee Gye-Sik. Formal Specification of Cryptographic Security Protocols. 2019; 14(6), 711-718. Available from: doi:10.34163/jkits.2019.14.6.014
Lee Gye-Sik. "Formal Specification of Cryptographic Security Protocols" Journal of Knowledge Information Technology and Systems 14, no.6 (2019) : 711-718.doi: 10.34163/jkits.2019.14.6.014
Lee Gye-Sik. Formal Specification of Cryptographic Security Protocols. Journal of Knowledge Information Technology and Systems, 14(6), 711-718. doi: 10.34163/jkits.2019.14.6.014
Lee Gye-Sik. Formal Specification of Cryptographic Security Protocols. Journal of Knowledge Information Technology and Systems. 2019; 14(6) 711-718. doi: 10.34163/jkits.2019.14.6.014
Lee Gye-Sik. Formal Specification of Cryptographic Security Protocols. 2019; 14(6), 711-718. Available from: doi:10.34163/jkits.2019.14.6.014
Lee Gye-Sik. "Formal Specification of Cryptographic Security Protocols" Journal of Knowledge Information Technology and Systems 14, no.6 (2019) : 711-718.doi: 10.34163/jkits.2019.14.6.014