Proof theory, transformations, and logic programming for debugging security protocols

G. Delzanno, S. Etalle

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    5 Citaten (Scopus)

    Samenvatting

    In this paper we define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of principals and the current global state of the session. Hereby, we can describe the operational semantics of principals and of an intruder in a simple and modular way. Furthermore, using proof theoretic tools like the analysis of permutability of rules, we are able to find efficient proof strategies that we prove complete for special classes of security protocols including Needham-Schroeder. Based on the results of this preliminary analysis, we have implemented a Prolog meta-interpreter which allows for rapid prototyping and for checking safety properties of security protocols, and we have applied it for finding error traces and proving correctness of practical examples.
    Originele taal-2Engels
    TitelLogic based program synthesis and transformation : 11th international workshop, LOPSTR 2001, Paphos, Cyprus, november 28-30, 2001, selected papers
    RedacteurenA. Petterossi
    UitgeverijSpringer
    Pagina's76-90
    ISBN van geprinte versie3-540-43915-3
    DOI's
    StatusGepubliceerd - 2001

    Publicatie series

    NaamLecture Notes in Computer Science
    Volume2372
    ISSN van geprinte versie0302-9743

    Vingerafdruk

    Duik in de onderzoeksthema's van 'Proof theory, transformations, and logic programming for debugging security protocols'. Samen vormen ze een unieke vingerafdruk.

    Citeer dit