Zusammenfassung
Kryptographische Protokolle enthalten häufig subtile Fehler, die manchmal erst Jahre nach dem Design festgestellt werden. Deswegen hat es sich als günstig erwiesen, diese Protokolle bereits im Designprozeß formal zu analysieren. Eine formale Methode zwingt einen Protokolldesigner dazu, genau aufzuschreiben, welche Voraussetzungen er benötigt und welche Sicherheitsziele er erreichen will.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Literatur
M. Abadi, M. Tuttle, “A Semantics for a Logic of Authentication,” Proc. of the ACM Symp. of Principles of Distributed Computing, 1991, 201–216.
M. Burrows, M. Abadi, R. Needham, A Logic of Authentication, Report 39 Digital Systems Research Center, Pao Alto, California, 1989.
D. Bolignano, “Towards the Formal Verification of Electronic Commerce Protocols, ” Proc. of the 10th Computer Security Foundations Workshop Rockport, IEEE Computer Society, 133–146.
B. Chellas, Modal Logic, Cambridge University Press, Cambridge, England, 1980.
R.A. DeMillo, R.J. Lipton, and A.J. Perlis, “Social Processes and Proofs of Theorems and Programs, ” Comm. ACM, vol. 22, no. 5, 1979.
R. Fagin, J. Halpern, Y. Moses, M. Vardi, Reasoning About Knowledge, MIT Press, Cambridge, Mass., 1995.
L. Gong, R. Needham, R. Yahalom, “Reasoning about Belief in Cryptographic Protocols, ” Proc. of the 1990 IEEE Symp. on Research in Security and Privacy 234–248.
R. Kailar, “Accountability in Electronic Commerce Protocols,” IEEE Trans, on Software Engineering, Vol. 22, No. 5, 1996, 313–328.
V. Kessler, H. Neumann, “A Sound Logic for Analysing Electronic Commerce Protocols,” Computer Security — ESORICS 98, Louvain, Springer LNCS to appear.
MasterCard and VISA Corporations, “Secure Electronic Transaction (SET),” http://www.mastercard.com/set und http://www.visa.com/
C. Meadows, P. Syverson, “A Formal Specification of Requirements for Payment Transactions in the SET Protocol,” Preproceedings of Financial Cryptography, 1998.
T. Pedersen, “Electronic Payments of Small Amounts,” Proc. Security Protocols 1996, Springer LNCS 1189, 59–68.
B. Pfitzmann, M. Waidner, Properties of Payment Systems: General Definition Sketch and Classification IBM Research Report RZ 2823 05/06/1996, IBM Research Division, Zurich.
R. Rivest, A. Shamir, “Payword and Micromint: Two simple micropayment protocols,” Proc. Security Protocols 1996, Springer LNCS 1189, 69–88.
S. Stubblebine, R. Wright, “An Authentication Logic Supporting Synchronization, Revocation, and Receny,” Proc. Third ACM Conference on Computer and Communiations Security, New Delhi, 1996, 95–105.
P. Syverson, P. van Oorschot, “On Unifying Some Cryptographic Protocol Logics,” Proc. of the IEEE Computer Society Symp. on Security and Privacy 1994, 14–28.
G. Wedel, Formale Semantik für Authentifikationslogiken, Diplomarbeit FB Mathematik der RWTH Aachen, Nov. 1995.
G. Wedel, V. Kessler, “Formal Semantics for Authentication Logics,” Computer Security — ESORICS 96, Rome, Springer LNCS 1146, 1996, 219–241.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1999 Friedr. Vieweg & Sohn Verlagsgesellschaft mbH, Braunschweig/Wiesbaden
About this chapter
Cite this chapter
Kessler, V., Neumann, H. (1999). Eine korrekte Authentifikationslogik zur Analyse von Electronic-Commerce-Protokollen. In: Röhm, A.W., Fox, D., Grimm, R., Schoder, D. (eds) Sicherheit und Electronic Commerce. DuD-Fachbeiträge. Vieweg+Teubner Verlag. https://doi.org/10.1007/978-3-322-84901-4_2
Download citation
DOI: https://doi.org/10.1007/978-3-322-84901-4_2
Publisher Name: Vieweg+Teubner Verlag
Print ISBN: 978-3-528-03139-8
Online ISBN: 978-3-322-84901-4
eBook Packages: Springer Book Archive