Skip to main content

The Impact of Time Parameters on the Security Protocols Correctness

  • Conference paper
  • First Online:
  • 856 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 860))

Abstract

The security of computer network users is a very important aspect of the network administrators’ work. The related analysis and verification of security protocols (SP) is a key tool in the fight against access to data by unauthorized users.

This paper will present analysis and verification of timed security protocols. In order to carry out research the formal model and the computational structure presented in earlier works, were extended. Protocols’ analysis was related to the influence of time parameters on its security. The times of message encryption and decryption and delays in the network were investigated. The tests were carried out in two stages. In the first stage, the possibility to carry out generated protocols was tested. In the second stage, the execution times were analyzed for different values of time parameters. We proofed that the proper analysis and appropriately adopted time conditions make the protocol safer.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Cortier, V., Delaune, S., Lafourcade, P.: A survey of algebraic properties used in cryptographic protocols. J. Comput. Secur. 14(1), 1–43 (2006)

    Article  Google Scholar 

  2. Bolignano, D.: An approach to the formal verification of cryptographic protocols. In: Third ACM Conference on Computer and Communications Security, pp. 106–118. ACM Press (1996)

    Google Scholar 

  3. Satyanarayanan, M.: Integrating security in a large distributed system. ACM Trans. Comput. Syst. 7(3), 247–280 (1989)

    Article  Google Scholar 

  4. Sprenger, C., Basin, D.: Refining security protocols. J. Comput. Secur. 26(1), 71–120 (2018)

    Article  Google Scholar 

  5. Meadows, C.A., Meadows, C.A.: Formal verification of cryptographic protocols: a survey. In: Pieprzyk, J., Safavi-Naini, R. (eds.) ASIACRYPT 1994. LNCS, vol. 917, pp. 133–150. Springer, Heidelberg (1995). https://doi.org/10.1007/BFb0000430

    Chapter  Google Scholar 

  6. Kurkowski, M.: Formalne metody weryfikacji wlasnosci protokolow zabezpieczających w sieciach komputerowych. Informatyka - Akademicka Oficyna Wydawnicza EXIT (2013)

    Google Scholar 

  7. Corin, R., Etalle, S., Hartel, P.H., Mader, A.: Timed analysis of security protocols. J. Comput. Secur. 15(6) (2007)

    Article  Google Scholar 

  8. Basin, D., Modersheim, S., Viganò, L.: Technical report no. 450 OFMC: a symbolic model-checker for security protocols (2004)

    Google Scholar 

  9. Cremers, C., Mauw, S.: Operational Semantics and Verification of Security Protocols. Information Security and Cryptography. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-540-78636-8

    Book  MATH  Google Scholar 

  10. Jakubowska, G., Penczek, W., Srebrny, M.: Verifying timed security protocols via translation to timed automata. In: International Workshop on Concurrency, Specification and Programming (CS&P 2002). Lecture Notes in Computer Science, pp. 100–115 (2005). Warsaw University

    Google Scholar 

  11. Jakubowska, G., Penczek, W.: Is your security protocol on time? In: Arbab, F., Sirjani, M. (eds.) FSEN 2007. LNCS, vol. 4767, pp. 65–80. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-75698-9_5

    Chapter  MATH  Google Scholar 

  12. Jakubowska, G., Penczek, W.: Modelling and checking timed authentication of security protocols. Fundam. Inform. 79(3–4), 363–378 (2007)

    MathSciNet  MATH  Google Scholar 

  13. Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18–36 (1990)

    Article  Google Scholar 

  14. Szymoniak, S., Kurkowski, M., Piatkowski, J.: Timed models of security protocols including delays in the network. J. Appl. Mathe. Comput. Mech. 14(3), 127–139 (2015)

    Article  Google Scholar 

  15. Szymoniak, S., Siedlecka-Lamch, O., Kurkowski, M.: Timed analysis of security protocols. In: Grzech, A., Świątek, J., Wilimowska, Z., Borzemski, L. (eds.) Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology – ISAT 2016 – Part II. AISC, vol. 522, pp. 53–63. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-46586-9_5

    Chapter  Google Scholar 

  16. Szymoniak, S.: Analysis and simulations of timed security protocols. Studa Inf. 38(2), 55–66 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sabina Szymoniak .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Szymoniak, S. (2018). The Impact of Time Parameters on the Security Protocols Correctness. In: Gaj, P., Sawicki, M., Suchacka, G., Kwiecień, A. (eds) Computer Networks. CN 2018. Communications in Computer and Information Science, vol 860. Springer, Cham. https://doi.org/10.1007/978-3-319-92459-5_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-92459-5_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-92458-8

  • Online ISBN: 978-3-319-92459-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics