Synthesizing secure protocols

Véronique Cortier 1 Bogdan Warinschi 2 Eugen Zalinescu 1
1 CASSIS - Combination of approaches to the security of infinite states systems
FEMTO-ST - Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174), INRIA Lorraine, LORIA - Laboratoire Lorrain de Recherche en Informatique et ses Applications
Abstract : We propose a general transformation that maps a protocol secure in an extremely weak sense (essentially in a model where no adversary is present) into a protocol that is secure against a fully active adversary which interacts with an unbounded number of protocol sessions, and has absolute control over the network. The transformation works for arbitrary protocols with any number of participants, written with usual cryptographic primitives. Our transformation provably preserves a large class of security properties that contains secrecy and authenticity. An important byproduct contribution of this paper is a modular protocol development paradigm where designers focus their effort on an extremely simple execution setting -- security in more complex settings being ensured by our generic transformation. Conceptually, the transformation is very simple, and has a clean, well motivated design. Each message is tied to the session for which it is intended via digital signatures and on-the-fly generated session identifiers, and prevents replay attacks by encrypting the messages under the recipient's public key.
Type de document :
[Research Report] RR-6166, INRIA. 2007, pp.32
Liste complète des métadonnées

Littérature citée [16 références]  Voir  Masquer  Télécharger
Contributeur : Rapport de Recherche Inria <>
Soumis le : mardi 24 avril 2007 - 12:12:56
Dernière modification le : vendredi 6 juillet 2018 - 15:06:10
Document(s) archivé(s) le : mardi 21 septembre 2010 - 13:01:29


Fichiers produits par l'(les) auteur(s)


  • HAL Id : inria-00140932, version 2


Véronique Cortier, Bogdan Warinschi, Eugen Zalinescu. Synthesizing secure protocols. [Research Report] RR-6166, INRIA. 2007, pp.32. 〈inria-00140932v2〉



Consultations de la notice


Téléchargements de fichiers