Toggle Main Menu Toggle Search

ePrints

A Framework for the Rigorous Implementation of Security Protocols

Lookup NU author(s): Dr Paul Robinson, Dr Nick Cook, Emeritus Professor Santosh Shrivastava

Downloads


Abstract

The correct implementation of security protocols is a challenging task. Like any software, to gain high confidence in a given implementation, ideally one requires both: (i) a formal specification that has been subjected to verification; and (ii) tool support to generate an implementation from the verified specification. The former area has attracted considerable attention for security protocols, and significant advances have been made. In the latter area, the state of the art has not progressed beyond simple security protocols with a small number of steps. This paper presents an improved approach to protocol implementation. Starting with a formal protocol specification, a rigorous process with considerable tool support leads to the deployment of implementations in a flexible middleware framework for their execution. To illustrate the approach, the paper describes the implementation of a deterministic, fair non-repudiation protocol. Such protocols are quite complex, as they require both sub-protocols and trusted third party involvement in order to guarantee fairness. Therefore, it is reasonable to assume that we can extend the approach to a wide range of less complex, deterministic


Publication metadata

Author(s): Robinson P, Cook NO, Shrivastava SK

Publication type: Report

Publication status: Published

Series Title: School of Computing Science Technical Report Series

Year: 2005

Pages: 19

Print publication date: 01/12/2005

Source Publication Date: December 2005

Report Number: 937

Institution: School of Computing Science, University of Newcastle upon Tyne

Place Published: Newcastle upon Tyne

URL: http://www.cs.ncl.ac.uk/publications/trs/papers/937.pdf


Share