Proving secure properties of cryptographic protocols with knowledge based approach

Xiaochun Cheng, Xiaoqi Ma, Maggie Cheng, Scott C.H. Huang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

Cryptographic protocols have been widely used to protect communications over insecure network environments. Existing cryptographic protocols usually contain flaws. To analyze these protocols and find potential flaws in them, the secure properties of them need be studied in depth. This paper attempts to provide a new framework to analyze and prove the secure properties in these protocols. A number of predicates and action functions are used to model the network communication environment. Domain rules are given to describe the transitions of principals' knowledge and belief states. An example of public key authentication protocols has been studied and analysed.

Original languageEnglish (US)
Title of host publicationConference Proceedings of the 24th IEEE International Performance, Computing, and Communications Conference, IPCCC 2005
EditorsT. Dahlberg, R. Oliver, A. Sen, G. Xue
Pages3-9
Number of pages7
StatePublished - Dec 12 2005
Externally publishedYes
Event24th IEEE International Performance, Computing, and Communications Conference, IPCCC 2005 - Phoenix, AZ, United States
Duration: Apr 7 2005Apr 9 2005

Other

Other24th IEEE International Performance, Computing, and Communications Conference, IPCCC 2005
Country/TerritoryUnited States
CityPhoenix, AZ
Period4/7/054/9/05

All Science Journal Classification (ASJC) codes

  • General Engineering

Fingerprint

Dive into the research topics of 'Proving secure properties of cryptographic protocols with knowledge based approach'. Together they form a unique fingerprint.

Cite this