Safely composing security protocols - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Rapport (Rapport De Recherche) Année : 2007

Safely composing security protocols

Résumé

Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol in the presence of active attackers that may block, intercept and send new messages. However even when a protocol has been proved secure, there is absolutely no guarantee if the protocol is executed in an environment where other protocols, possibly sharing some common identities and keys like public keys or long-term symmetric keys, are executed. In this paper, we show that security of protocols can be easily composed. More precisely, we show that whenever a protocol is secure, it remains secure even in an environment where arbitrary protocols are executed, provided each encryption contains some tag identifying each protocol, like e.g. the name of the protocol.
Fichier principal
Vignette du fichier
RapportINRIA.pdf (268.96 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

inria-00157889 , version 1 (27-06-2007)
inria-00157889 , version 2 (28-06-2007)

Identifiants

  • HAL Id : inria-00157889 , version 1

Citer

Véronique Cortier, Jérémie Delaitre, Stéphanie Delaune. Safely composing security protocols. [Research Report] 2007, pp.26. ⟨inria-00157889v1⟩
134 Consultations
201 Téléchargements

Partager

Gmail Facebook X LinkedIn More