ON-THE-FLY AUTOMATIC GENERATION OF SECURITY PROTOCOLS

Shinsaku Kiyomoto, Haruki Ota, Toshiaki Tanaka

2008

Abstract

In this paper, we presented an automatic generation tool for authentication and key exchange protocols. Our tool generates a security protocol definition file from input data of requirements for the protocol. The tool constructs a new protocol that combines a pieces of security protocols as building blocks. The transaction time of the tool is less than one second and it is able to realize more rapid generation of security protocols in comparison to existing generation tools.

References

  1. Abadi, M. and Gordon, D. (1999). A calculus for cryptographic protocols the spi calculus. Inf. Comput., 148(1):1-70.
  2. Bellare, M. and Rogaway, P. (1994). Entity authentication and key distribution. In Proc. of CRYPTO 7893, LNCS, volume 773, pages 232-249. Springer Verg.
  3. Bellare, M. and Rogaway, P. (1995). Provably secure session key distribution: thethree party case. In Proc. of 27th Annual Symposium on the Theory of Computing, pages pp. 57-66. ACM.
  4. Blake-Wilson, S., Johnson, D., and Menesez, A. (1997). Key agreement protocols and their security analysis. In Proc. of 6th IMA International Conference on Cryptography and Coding, LNCS, volume 1355, pages pp. 30-45. Springer Verg.
  5. Didelot, X. (2003). A compiler for security protocols. Available at http:// web.comlab.ox.ac.uk/oucl/work/gavin.lowe/Security/ Casper/COSPJ/s%ecu.pdf.
  6. Foley, S. N. and Zhou, H. (2003). Towards a framework for automatic security protocols. In Proc. of Security Protocol Workshop 2003, LNCS, volume 3364, pages 49-54. Springer Verg.
  7. Lowe, G. (1997). Casper: A compiler for the analysis of security protocols. In Proc. of 10th IEEE Computer Security Foundations Workshop, pages 18-30. IEEE.
  8. Perrig, A. and Song, D. (2000a). A first step towards the automatic generation of security protocols. In Proc. of Network and Distributed System Security Symposium NDSS 2000, pages 73-83.
  9. Perrig, A. and Song, D. (2000b). Looking for diamonds in the desert - extending automatic protocol generation to tree-party authentication and key agreement protocols. In Proc. of 13th IEEE Computer Security Foundations Workshop, pages 64-76. IEEE.
  10. Pozza, D., Sisto, R., and Durante, L. (2004). Spi2java: Automatic cryptographic protocol java code generation from spi calculus. In Proc. of 18th International Conference on Advanced Information Networking and Application (AINA'04), pages 400-405. IEEE.
  11. Song, D., Perrig, A., and Phan, D. (2001). Agvi -automatic generation, verification, and implementation of security protocols. In Proc. of 13th Conference on Computer Aided Verification (CAV), pages 241-255. Springer Verg.
  12. Zhou, H. and Foley, S. N. (2003). Fast automatic synthesis of security protocols using backward search. In Proc. of the 2003 ACM Workshop on Formal Methods for Security Engineering, pages 1-10. ACM.
  13. Table 5: Requirements for a Security Protocol.
Download


Paper Citation


in Harvard Style

Kiyomoto S., Ota H. and Tanaka T. (2008). ON-THE-FLY AUTOMATIC GENERATION OF SECURITY PROTOCOLS . In Proceedings of the Tenth International Conference on Enterprise Information Systems - Volume 6: ICEIS, ISBN 978-989-8111-38-8, pages 97-104. DOI: 10.5220/0001677500970104


in Bibtex Style

@conference{iceis08,
author={Shinsaku Kiyomoto and Haruki Ota and Toshiaki Tanaka},
title={ON-THE-FLY AUTOMATIC GENERATION OF SECURITY PROTOCOLS},
booktitle={Proceedings of the Tenth International Conference on Enterprise Information Systems - Volume 6: ICEIS,},
year={2008},
pages={97-104},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001677500970104},
isbn={978-989-8111-38-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Tenth International Conference on Enterprise Information Systems - Volume 6: ICEIS,
TI - ON-THE-FLY AUTOMATIC GENERATION OF SECURITY PROTOCOLS
SN - 978-989-8111-38-8
AU - Kiyomoto S.
AU - Ota H.
AU - Tanaka T.
PY - 2008
SP - 97
EP - 104
DO - 10.5220/0001677500970104