Sciweavers

CSFW
2005
IEEE

Analysis of Typed Analyses of Authentication Protocols

14 years 5 months ago
Analysis of Typed Analyses of Authentication Protocols
This paper contrasts two existing type-based techniques for the analysis of authentication protocols. The former, proposed by Gordon and Jeffrey, uses dependent types for nonces and cryptographic keys to statically regulate the way that nonces are created and checked in the authentication exchange. The latter, proposed by the authors, relies on a combination of static and dynamic typing to achieve similar goals. Specifically, the type system employs dependent ciphertext types to statically define certain tags that determine the typed structure of the messages circulated in the authentication exchange. The type tags are then checked dynamically to verify that each message has the format expected at the corresponding step of the authentication exchange. This paper compares the two approaches, drawing on a translation of tagged protocols, validated by our system, into protocols that type check with Gordon and Jeffrey’s system. This translation gives new insight into the trade-offs be...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
Added 24 Jun 2010
Updated 24 Jun 2010
Type Conference
Year 2005
Where CSFW
Authors Michele Bugliesi, Riccardo Focardi, Matteo Maffei
Comments (0)