Safely composing security protocols

Véronique Cortier 1 Jérémie Delaitre 1 Stéphanie Delaune 1
1 CASSIS - Combination of approaches to the security of infinite states systems
FEMTO-ST - Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies, INRIA Lorraine, LORIA - Laboratoire Lorrain de Recherche en Informatique et ses Applications
Abstract : Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol in the presence of active attackers that may block, intercept and send new messages. However even when a protocol has been proved secure, there is absolutely no guarantee if the protocol is executed in an environment where other protocols, possibly sharing some common identities and keys like public keys or long-term symmetric keys, are executed. In this paper, we show that security of protocols can be easily composed. More precisely, we show that whenever a protocol is secure, it remains secure even in an environment where arbitrary protocols are executed, provided each encryption contains some tag identifying each protocol, like e.g. the name of the protocol.
Type de document :
Rapport
[Research Report] RR-6234, INRIA. 2007, pp.26
Liste complète des métadonnées

Littérature citée [20 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/inria-00157889
Contributeur : Rapport de Recherche Inria <>
Soumis le : jeudi 28 juin 2007 - 10:03:34
Dernière modification le : jeudi 15 février 2018 - 08:48:09
Document(s) archivé(s) le : mardi 21 septembre 2010 - 13:35:55

Fichiers

RR-6234.pdf
Fichiers produits par l'(les) auteur(s)

Identifiants

  • HAL Id : inria-00157889, version 2

Citation

Véronique Cortier, Jérémie Delaitre, Stéphanie Delaune. Safely composing security protocols. [Research Report] RR-6234, INRIA. 2007, pp.26. 〈inria-00157889v2〉

Partager

Métriques

Consultations de la notice

257

Téléchargements de fichiers

130