Verification of security protocols based on multicast communication/
Abstract: Over an insecure network, agents need means to communicate securely. To these means we often call security protocols. Security protocols, although constructed over the ar- rangement of simple security blocks, normally target the yielding of complex goals. They seem simple at a first glance...
Na minha lista:
Principais autores: | , , |
---|---|
Formato: | Tese |
Publicado em: |
|
Assuntos: | |
Endereço do item: | https://app.bczm.ufrn.br/home/#/item/215906 |
Tags: |
Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
|
id |
oai:localhost:123456789-143059 |
---|---|
record_format |
dspace |
spelling |
oai:localhost:123456789-1430592022-12-01T05:28:11Z Verification of security protocols based on multicast communication/ Martina, Jean Everson. Paulson, Lawrence C. University of Cambridge. Protocolos de segurança Tese. Comunicação multicast na camada de aplicação Tese. Modelagem indutiva Tese. Abstract: Over an insecure network, agents need means to communicate securely. To these means we often call security protocols. Security protocols, although constructed over the ar- rangement of simple security blocks, normally target the yielding of complex goals. They seem simple at a first glance, but hide subtleties that allow them to be exploited. One way of trying to systematically capture such subtleties is through the usage of formal methods. The maturity of some methods for protocol verification is a fact today. But these methods are still not able to capture the whole set of security protocols being designed. With the convergence to an on-line world, new security goals are proposed and new protocols need to be designed. The evolution of formal verification methods becomes a necessity to keep the pace with this ongoing development. This thesis covers the Inductive Method and its extensions. The Inductive Method is a formalism to specify and verify security protocols based on structural induction and higher-order logic proofs. The account of our extensions comes to enable the Inductive Method to reason about non-Unicast communication and threshold cryptography. We developed a new set of theories capable of representing the entire known message casting frameworks, Our theories enable the Inductive Method to reason about a whole new set of protocols. We also specified a basic abstraction of threshold cryptography as a way of proving the extensibility of the method regarding new cryptographic primitives. We shown the feasibility of our specitications by revisiting a classic protocol, now veritied under our framework. Secrecy verification under a mixed environment of Multicast and Unicast was also done. 1 2022-10-06T11:44:46Z 2022-10-06T11:44:46Z [2011]. Tese 004.056 M379v TESE 215906 https://app.bczm.ufrn.br/home/#/item/215906 https://app.bczm.ufrn.br/home/#/item/215906 |
institution |
Acervo SISBI |
collection |
SIGAA |
topic |
Protocolos de segurança Tese. Comunicação multicast na camada de aplicação Tese. Modelagem indutiva Tese. |
spellingShingle |
Protocolos de segurança Tese. Comunicação multicast na camada de aplicação Tese. Modelagem indutiva Tese. Martina, Jean Everson. Paulson, Lawrence C. University of Cambridge. Verification of security protocols based on multicast communication/ |
description |
Abstract: Over an insecure network, agents need means to communicate securely. To these means we often call security protocols. Security protocols, although constructed over the ar- rangement of simple security blocks, normally target the yielding of complex goals. They seem simple at a first glance, but hide subtleties that allow them to be exploited. One way of trying to systematically capture such subtleties is through the usage of formal methods. The maturity of some methods for protocol verification is a fact today. But these methods are still not able to capture the whole set of security protocols being designed. With the convergence to an on-line world, new security goals are proposed and new protocols need to be designed. The evolution of formal verification methods becomes a necessity to keep the pace with this ongoing development. This thesis covers the Inductive Method and its extensions. The Inductive Method is a formalism to specify and verify security protocols based on structural induction and higher-order logic proofs. The account of our extensions comes to enable the Inductive Method to reason about non-Unicast communication and threshold cryptography. We developed a new set of theories capable of representing the entire known message casting frameworks, Our theories enable the Inductive Method to reason about a whole new set of protocols. We also specified a basic abstraction of threshold cryptography as a way of proving the extensibility of the method regarding new cryptographic primitives. We shown the feasibility of our specitications by revisiting a classic protocol, now veritied under our framework. Secrecy verification under a mixed environment of Multicast and Unicast was also done. |
format |
Tese |
author |
Martina, Jean Everson. Paulson, Lawrence C. University of Cambridge. |
author_facet |
Martina, Jean Everson. Paulson, Lawrence C. University of Cambridge. |
author_sort |
Martina, Jean Everson. |
title |
Verification of security protocols based on multicast communication/ |
title_short |
Verification of security protocols based on multicast communication/ |
title_full |
Verification of security protocols based on multicast communication/ |
title_fullStr |
Verification of security protocols based on multicast communication/ |
title_full_unstemmed |
Verification of security protocols based on multicast communication/ |
title_sort |
verification of security protocols based on multicast communication/ |
publishDate |
2022 |
url |
https://app.bczm.ufrn.br/home/#/item/215906 |
work_keys_str_mv |
AT martinajeaneverson verificationofsecurityprotocolsbasedonmulticastcommunication AT paulsonlawrencec verificationofsecurityprotocolsbasedonmulticastcommunication AT universityofcambridge verificationofsecurityprotocolsbasedonmulticastcommunication |
_version_ |
1766852606207983616 |