they fail to ensure the security of a protocol they give
the exact components that could be inappropriately
protected. We believe also that interpretation func-
tions are more helping during the conception of new
protocols and could give some guidelines.
9 CONCLUSION
By using the notion of safe interpretation functions,
this paper gives sufficient conditions to guarantee the
correctness of a cryptographic protocol with respect
to the the secrecy property. These conditions could be
verified in a linear time on the protocol. It gives also a
practical way to construct these kind of interpretation
functions.
As future works, we want to show the efficiency of
this approach by verifying real life protocols such as
SSL, SET, Kerberos, etc. We would like also to define
other safe and universal interpretation functions. Fi-
nally, it will be interesting to see wether this approach
could help in order analyze others security proper-
ties.
REFERENCES
Abadi, M. (1999). Secrecy by typing in security protocols.
Journal of the ACM, 46(5):749–786.
Blanchet, B. and Podelski, A. (2003). Verification of cryp-
tographic protocols: Tagging enforces termination. In
Foundations of Software Science and Computational
Structures, volume 2620 / 2003, pages 136–152, War-
saw, Poland. Springer-Verlag Heidelberg.
Boreale, M. and Gorla, D. (2002). Process calculi
and the verification of security properties. Journal
of Telecommunication and Information Technology—
Special Issue on Cryptographic Protocol Verification,
(4/02):28–40.
Burrows, M., Abadi, M., and Needham, R. (1990). Re-
joinder to Nessett. ACM Operating Systems Review,
24(2):39–40.
Cervesato, I., Durgin, N. A., Lincoln, P., Mitchell, J. C.,
and Scedrov, A. (1999). A meta-notation for protocol
analysis. In CSFW, pages 55–69.
Comon, H. and Shmatikov, V. (2002). Is it possible to de-
cide whether a cryptographic protocol is secure or not.
Journal of Telecommunications and Information Tech-
nolog,.
Comon-Lundh, H. and Cortier, V. (2003a). New decidabil-
ity results for fragments of first-order logic and ap-
plication to cryptographic protocols. In RTA, pages
148–164.
Comon-Lundh, H. and Cortier, V. (2003b). Security prop-
erties: Two agents are sufficient. In ESOP, pages 99–
113.
Delicata, R. and Schneider, S. (2005). Temporal rank func-
tions for forward secrecy. In CSFW ’05: Proceed-
ings of the 18th IEEE Computer Security Foundations
Workshop (CSFW’05), pages 126–139, Washington,
DC, USA. IEEE Computer Society.
Durgin, N., Mitchell, J., and Pavlovic, D. (2001). A com-
positional logic for protocol correctness.
Even, S. and Goldreich, O. (1983). On the security of multi-
party ping-pong protocols. In IEEE Symposium on
Foundations of Computer Science, pages 34–39.
Gangon, F. and Mejri, M. (2006). A decision procedure for
structured cryptographic protocols. In New Trends in
Software Methodologies, Tools and Techniques, pages
272–286. IOS Press.
Heintze, N. and Tygar, J. D. (1996). A model for secure pro-
tocols and their compositions. Software Engineering,
22(1):16–30.
Houmani, H. and Mejri, M. (2003). Secure protocols for se-
crecy. In Foundations of Computer Security Afiliated
with LICS’03, pages 85–96, Ottawa, Canada.
Houmani, H. and Mejri, M. (2007a). Secrecy by in-
terpretation functions. Knowledge-Based Systems,
doi:10.1016/j.knosys.2007.05.003.
Houmani, H. and Mejri, M. (2007b). Secrecy by interpreta-
tion functions: Extended version. Thechnical Report,
www.ift.ulaval.ca\
˜
hahou\techReport1.pdf
.
Lowe, G. (1998). Towards a Completeness Result for
Model Checking of Security Protocols. In Proceed-
ings of 11th IEEE Computer Security Foundations
Workshop, pages 96–108.
Mao, W. and Boyd, C. (1993). Towards the Formal Analy-
sis of Security Protocols. In Proceedings of the Com-
puter Security Foundations Workshop VI, pages 147–
158. IEEE Computer Society Press.
Meadows, C. (2003). What makes a cryptographic protocol
secure? the evolution of requirements specification in
formal cryptographic protocol analysis. In Proceed-
ings of ESOP 03. Springer-Verlag.
Paulson, L. C. (1997). Proving properties of security pro-
tocols by induction. In 10th Computer Security Foun-
dations Workshop, pages 70–83. IEEE Computer So-
ciety Press.
Ramanujam, R. and Suresh, S. (2003). Tagging makes
secrecy decidable with unbounded nonces as well.
In Lecture Notes in Computer Science, volume
2914/2003. FST TCS 2003: Foundations of Software
Technology and Theoretical Computer Science, Pub-
lisher Springer Berlin / Heidelberg.
Schneider, S. (1998). Verifying authentication protocols in
csp. IEEE Trans. Softw. Eng., 24(9):741–758.
Stoller, S. D. (1999). Lower and upper bounds for attacks on
authentication protocols. In Symposium on Principles
of Distributed Computing, page 283.
Woo, T. Y. C. and Lam, S. S. (1994). A Lesson on Authen-
tication Protocol Design. Operating Systems Review,
pages 24–37.
SECRYPT 2007 - International Conference on Security and Cryptography
164