Abstract
We study FSM model of cryptographic protocols that reflects both the system functionality and strategy of attacks and explored the fact that all data are divided into two classes: public transactions available to all parties and private data available to only party that inputted or originated them. In terms of this model the protocols FSM composition property and operation of composition of protocols FSM models are determined. This approach is supported by created software called algebraic processor that allows computer experiments to identify and demonstrate the leaks. We describe the structure and functionality of algebraic processor and some examples of attacked cryptographic protocols simulations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Mao, W.: Theory and Practice. Hewlett Packard Company. Prentice-Hall Inc. PTR, New Jersey (2004)
Cremers, C., Lafourcade, P.: Comparing State Spaces in Automatic Security Protocol Verification. Electronic Notes in Theoretical Computer Science. ETH Technical Report, No. 558 (2007), http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CL-avocs07.pdf
Canetti, R.: Security and Composition of Cryptographic Protocols: A Tutorial. Technical Report 2006/465, Cryptology ePrint Archive (2006), http://eprint.iacr.org/2006/465
Kousters, R., Tuengerthal, M.: Joint State Composition Theorems for public-Key Encryption and Digital Signature Functionalities with Local Computation, http://eprint.iacr.org/2008/006.pdf
Raju, R., Shanmugapriya, S., Mahalakshmi, P., Lalitha, G.: Providing security for Web Service Composition using Finite State Machine. International Journal of Computers & Technology 4(2) (March-April 2013)
Jan Jürjens, J., Guido Wimmel, G.: Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications, http://www4.informatik.tu-muenchen.de/publ/papers/JurWim00.pdf
Wason, R., Ahmed, P., Qasim Rafig, M.: Automata-Based Reliability Model: The key to Reliable Software. International Journal of Software Engineering and Its Applications 7(6), 111–126 (2013)
Dffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Info. Theory IT-22(6), 644–654 (1976)
Woo, T.Y.C., Lam, S.S.: Authentication for distributed systems. Computer 25(1), 39–52 (1992)
Abadi, M., Needman, R.: Prudent engineering practice for cryptographic protocols. Technocal Report DEC SRC Technical Peport 125. Digital Equipment Corporation (November 1995)
Joux, A.: One round protocol for tripartite Diffie-Hellman, LNCS. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838, pp. 385–393. Springer, Heidelberg (2000)
Boneh, D., Lynn, B., Shacham, H.: Short signatures from Weil pairing. J. of Cryptology 7, 297–319 (2004)
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM J. on Computing 32, 586–615 (2003)
Rottondi, C., Verticale, G., Capone, A.: Privacy-preserving smart metering with multiple da ta consumers. Computer Networks 57, 1699–1713 (2013)
Python/C API Reference Manual, http://docs.python.org/2/c-api/
Simplified Wrapper and Interface Generator, http://www.swig.org/
Emscripten: An LLVM-to-JavaScript Compiler, https://github.com/kripken/emscripten
Low Level Virtual Machine Intermediate Representation Bitcode, http://llvm.org/docs/BitCodeFormat.html
Clang: a C language family frontend for LLVM, http://clang.llvm.org/
Remote educational resource MPEI Processor, http://mm.mpei.ac.ru:8080/eng/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Frolov, A., Vinnikov, A. (2014). FSM Simulation of Cryptographic Protocols Using Algebraic Processor. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds) Proceedings of the Ninth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX. June 30 – July 4, 2014, Brunów, Poland. Advances in Intelligent Systems and Computing, vol 286. Springer, Cham. https://doi.org/10.1007/978-3-319-07013-1_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-07013-1_18
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07012-4
Online ISBN: 978-3-319-07013-1
eBook Packages: EngineeringEngineering (R0)