Skip to Main content Skip to Navigation
New interface
Reports (Research report)

Secure refinements of communication channels

Vincent Cheval 1, 2 Véronique Cortier 2 Eric Le Morvan 2 
2 CASSIS - Combination of approaches to the security of infinite states systems
FEMTO-ST - Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174), Inria Nancy - Grand Est, LORIA - FM - Department of Formal Methods
Abstract : It is a common practice to design a protocol (say Q) assuming some secure channels. Then the secure channels are implemented using any standard protocol, e.g. TLS. In this paper, we study when such a practice is indeed secure. We provide a characterization of both confidential and authenticated channels. As an application, we study several protocols of the literature including TLS and BAC protocols. Thanks to our result, we can consider a larger number of sessions when analyzing complex protocols resulting from explicit implementation of the secure channels of some more abstract protocol Q.
Document type :
Reports (Research report)
Complete list of metadata

Cited literature [17 references]  Display  Hide  Download
Contributor : Eric Le Morvan Connect in order to contact the contributor
Submitted on : Friday, November 27, 2015 - 4:59:23 PM
Last modification on : Wednesday, October 26, 2022 - 8:14:15 AM
Long-term archiving on: : Saturday, April 29, 2017 - 12:30:51 AM


Files produced by the author(s)


  • HAL Id : hal-01215265, version 2


Vincent Cheval, Véronique Cortier, Eric Le Morvan. Secure refinements of communication channels. [Research Report] RR-8790, LORIA, UMR 7503, Université de Lorraine, CNRS, Vandoeuvre-lès-Nancy. 2015, pp.50. ⟨hal-01215265v2⟩



Record views


Files downloads