Abstract
The security of computer network users is a very important aspect of the network administrators’ work. The related analysis and verification of security protocols (SP) is a key tool in the fight against access to data by unauthorized users.
This paper will present analysis and verification of timed security protocols. In order to carry out research the formal model and the computational structure presented in earlier works, were extended. Protocols’ analysis was related to the influence of time parameters on its security. The times of message encryption and decryption and delays in the network were investigated. The tests were carried out in two stages. In the first stage, the possibility to carry out generated protocols was tested. In the second stage, the execution times were analyzed for different values of time parameters. We proofed that the proper analysis and appropriately adopted time conditions make the protocol safer.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Cortier, V., Delaune, S., Lafourcade, P.: A survey of algebraic properties used in cryptographic protocols. J. Comput. Secur. 14(1), 1–43 (2006)
Bolignano, D.: An approach to the formal verification of cryptographic protocols. In: Third ACM Conference on Computer and Communications Security, pp. 106–118. ACM Press (1996)
Satyanarayanan, M.: Integrating security in a large distributed system. ACM Trans. Comput. Syst. 7(3), 247–280 (1989)
Sprenger, C., Basin, D.: Refining security protocols. J. Comput. Secur. 26(1), 71–120 (2018)
Meadows, C.A., Meadows, C.A.: Formal verification of cryptographic protocols: a survey. In: Pieprzyk, J., Safavi-Naini, R. (eds.) ASIACRYPT 1994. LNCS, vol. 917, pp. 133–150. Springer, Heidelberg (1995). https://doi.org/10.1007/BFb0000430
Kurkowski, M.: Formalne metody weryfikacji wlasnosci protokolow zabezpieczających w sieciach komputerowych. Informatyka - Akademicka Oficyna Wydawnicza EXIT (2013)
Corin, R., Etalle, S., Hartel, P.H., Mader, A.: Timed analysis of security protocols. J. Comput. Secur. 15(6) (2007)
Basin, D., Modersheim, S., Viganò, L.: Technical report no. 450 OFMC: a symbolic model-checker for security protocols (2004)
Cremers, C., Mauw, S.: Operational Semantics and Verification of Security Protocols. Information Security and Cryptography. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-540-78636-8
Jakubowska, G., Penczek, W., Srebrny, M.: Verifying timed security protocols via translation to timed automata. In: International Workshop on Concurrency, Specification and Programming (CS&P 2002). Lecture Notes in Computer Science, pp. 100–115 (2005). Warsaw University
Jakubowska, G., Penczek, W.: Is your security protocol on time? In: Arbab, F., Sirjani, M. (eds.) FSEN 2007. LNCS, vol. 4767, pp. 65–80. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-75698-9_5
Jakubowska, G., Penczek, W.: Modelling and checking timed authentication of security protocols. Fundam. Inform. 79(3–4), 363–378 (2007)
Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18–36 (1990)
Szymoniak, S., Kurkowski, M., Piatkowski, J.: Timed models of security protocols including delays in the network. J. Appl. Mathe. Comput. Mech. 14(3), 127–139 (2015)
Szymoniak, S., Siedlecka-Lamch, O., Kurkowski, M.: Timed analysis of security protocols. In: Grzech, A., Świątek, J., Wilimowska, Z., Borzemski, L. (eds.) Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology – ISAT 2016 – Part II. AISC, vol. 522, pp. 53–63. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-46586-9_5
Szymoniak, S.: Analysis and simulations of timed security protocols. Studa Inf. 38(2), 55–66 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Szymoniak, S. (2018). The Impact of Time Parameters on the Security Protocols Correctness. In: Gaj, P., Sawicki, M., Suchacka, G., Kwiecień, A. (eds) Computer Networks. CN 2018. Communications in Computer and Information Science, vol 860. Springer, Cham. https://doi.org/10.1007/978-3-319-92459-5_27
Download citation
DOI: https://doi.org/10.1007/978-3-319-92459-5_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-92458-8
Online ISBN: 978-3-319-92459-5
eBook Packages: Computer ScienceComputer Science (R0)