Verification of security protocols based on multicast communication/

Abstract: Over an insecure network, agents need means to communicate securely. To these means we often call security protocols. Security protocols, although constructed over the ar- rangement of simple security blocks, normally target the yielding of complex goals. They seem simple at a first glance...

ver descrição completa

Na minha lista:
Detalhes bibliográficos
Principais autores: Martina, Jean Everson., Paulson, Lawrence C., University of Cambridge.
Formato: Tese
Publicado em:
Assuntos:
Endereço do item:https://app.bczm.ufrn.br/home/#/item/215906
Tags: Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
id oai:localhost:123456789-143059
record_format dspace
spelling oai:localhost:123456789-1430592022-12-01T05:28:11Z Verification of security protocols based on multicast communication/ Martina, Jean Everson. Paulson, Lawrence C. University of Cambridge. Protocolos de segurança Tese. Comunicação multicast na camada de aplicação Tese. Modelagem indutiva Tese. Abstract: Over an insecure network, agents need means to communicate securely. To these means we often call security protocols. Security protocols, although constructed over the ar- rangement of simple security blocks, normally target the yielding of complex goals. They seem simple at a first glance, but hide subtleties that allow them to be exploited. One way of trying to systematically capture such subtleties is through the usage of formal methods. The maturity of some methods for protocol verification is a fact today. But these methods are still not able to capture the whole set of security protocols being designed. With the convergence to an on-line world, new security goals are proposed and new protocols need to be designed. The evolution of formal verification methods becomes a necessity to keep the pace with this ongoing development. This thesis covers the Inductive Method and its extensions. The Inductive Method is a formalism to specify and verify security protocols based on structural induction and higher-order logic proofs. The account of our extensions comes to enable the Inductive Method to reason about non-Unicast communication and threshold cryptography. We developed a new set of theories capable of representing the entire known message casting frameworks, Our theories enable the Inductive Method to reason about a whole new set of protocols. We also specified a basic abstraction of threshold cryptography as a way of proving the extensibility of the method regarding new cryptographic primitives. We shown the feasibility of our specitications by revisiting a classic protocol, now veritied under our framework. Secrecy verification under a mixed environment of Multicast and Unicast was also done. 1 2022-10-06T11:44:46Z 2022-10-06T11:44:46Z [2011]. Tese 004.056 M379v TESE 215906 https://app.bczm.ufrn.br/home/#/item/215906 https://app.bczm.ufrn.br/home/#/item/215906
institution Acervo SISBI
collection SIGAA
topic Protocolos de segurança
Tese.
Comunicação multicast na camada de aplicação
Tese.
Modelagem indutiva
Tese.
spellingShingle Protocolos de segurança
Tese.
Comunicação multicast na camada de aplicação
Tese.
Modelagem indutiva
Tese.
Martina, Jean Everson.
Paulson, Lawrence C.
University of Cambridge.
Verification of security protocols based on multicast communication/
description Abstract: Over an insecure network, agents need means to communicate securely. To these means we often call security protocols. Security protocols, although constructed over the ar- rangement of simple security blocks, normally target the yielding of complex goals. They seem simple at a first glance, but hide subtleties that allow them to be exploited. One way of trying to systematically capture such subtleties is through the usage of formal methods. The maturity of some methods for protocol verification is a fact today. But these methods are still not able to capture the whole set of security protocols being designed. With the convergence to an on-line world, new security goals are proposed and new protocols need to be designed. The evolution of formal verification methods becomes a necessity to keep the pace with this ongoing development. This thesis covers the Inductive Method and its extensions. The Inductive Method is a formalism to specify and verify security protocols based on structural induction and higher-order logic proofs. The account of our extensions comes to enable the Inductive Method to reason about non-Unicast communication and threshold cryptography. We developed a new set of theories capable of representing the entire known message casting frameworks, Our theories enable the Inductive Method to reason about a whole new set of protocols. We also specified a basic abstraction of threshold cryptography as a way of proving the extensibility of the method regarding new cryptographic primitives. We shown the feasibility of our specitications by revisiting a classic protocol, now veritied under our framework. Secrecy verification under a mixed environment of Multicast and Unicast was also done.
format Tese
author Martina, Jean Everson.
Paulson, Lawrence C.
University of Cambridge.
author_facet Martina, Jean Everson.
Paulson, Lawrence C.
University of Cambridge.
author_sort Martina, Jean Everson.
title Verification of security protocols based on multicast communication/
title_short Verification of security protocols based on multicast communication/
title_full Verification of security protocols based on multicast communication/
title_fullStr Verification of security protocols based on multicast communication/
title_full_unstemmed Verification of security protocols based on multicast communication/
title_sort verification of security protocols based on multicast communication/
publishDate 2022
url https://app.bczm.ufrn.br/home/#/item/215906
work_keys_str_mv AT martinajeaneverson verificationofsecurityprotocolsbasedonmulticastcommunication
AT paulsonlawrencec verificationofsecurityprotocolsbasedonmulticastcommunication
AT universityofcambridge verificationofsecurityprotocolsbasedonmulticastcommunication
_version_ 1766852606207983616