Skip to main content

Eine korrekte Authentifikationslogik zur Analyse von Electronic-Commerce-Protokollen

  • Chapter
Sicherheit und Electronic Commerce

Part of the book series: DuD-Fachbeiträge ((DUD))

  • 41 Accesses

Zusammenfassung

Kryptographische Protokolle enthalten häufig subtile Fehler, die manchmal erst Jahre nach dem Design festgestellt werden. Deswegen hat es sich als günstig erwiesen, diese Protokolle bereits im Designprozeß formal zu analysieren. Eine formale Methode zwingt einen Protokolldesigner dazu, genau aufzuschreiben, welche Voraussetzungen er benötigt und welche Sicherheitsziele er erreichen will.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literatur

  1. M. Abadi, M. Tuttle, “A Semantics for a Logic of Authentication,” Proc. of the ACM Symp. of Principles of Distributed Computing, 1991, 201–216.

    Google Scholar 

  2. M. Burrows, M. Abadi, R. Needham, A Logic of Authentication, Report 39 Digital Systems Research Center, Pao Alto, California, 1989.

    Google Scholar 

  3. D. Bolignano, “Towards the Formal Verification of Electronic Commerce Protocols, ” Proc. of the 10th Computer Security Foundations Workshop Rockport, IEEE Computer Society, 133–146.

    Google Scholar 

  4. B. Chellas, Modal Logic, Cambridge University Press, Cambridge, England, 1980.

    Google Scholar 

  5. R.A. DeMillo, R.J. Lipton, and A.J. Perlis, “Social Processes and Proofs of Theorems and Programs, ” Comm. ACM, vol. 22, no. 5, 1979.

    Google Scholar 

  6. R. Fagin, J. Halpern, Y. Moses, M. Vardi, Reasoning About Knowledge, MIT Press, Cambridge, Mass., 1995.

    MATH  Google Scholar 

  7. L. Gong, R. Needham, R. Yahalom, “Reasoning about Belief in Cryptographic Protocols, ” Proc. of the 1990 IEEE Symp. on Research in Security and Privacy 234–248.

    Google Scholar 

  8. R. Kailar, “Accountability in Electronic Commerce Protocols,” IEEE Trans, on Software Engineering, Vol. 22, No. 5, 1996, 313–328.

    Article  Google Scholar 

  9. V. Kessler, H. Neumann, “A Sound Logic for Analysing Electronic Commerce Protocols,” Computer Security — ESORICS 98, Louvain, Springer LNCS to appear.

    Google Scholar 

  10. MasterCard and VISA Corporations, “Secure Electronic Transaction (SET),” http://www.mastercard.com/set und http://www.visa.com/

  11. C. Meadows, P. Syverson, “A Formal Specification of Requirements for Payment Transactions in the SET Protocol,” Preproceedings of Financial Cryptography, 1998.

    Google Scholar 

  12. T. Pedersen, “Electronic Payments of Small Amounts,” Proc. Security Protocols 1996, Springer LNCS 1189, 59–68.

    Google Scholar 

  13. B. Pfitzmann, M. Waidner, Properties of Payment Systems: General Definition Sketch and Classification IBM Research Report RZ 2823 05/06/1996, IBM Research Division, Zurich.

    Google Scholar 

  14. R. Rivest, A. Shamir, “Payword and Micromint: Two simple micropayment protocols,” Proc. Security Protocols 1996, Springer LNCS 1189, 69–88.

    MathSciNet  Google Scholar 

  15. S. Stubblebine, R. Wright, “An Authentication Logic Supporting Synchronization, Revocation, and Receny,” Proc. Third ACM Conference on Computer and Communiations Security, New Delhi, 1996, 95–105.

    Chapter  Google Scholar 

  16. P. Syverson, P. van Oorschot, “On Unifying Some Cryptographic Protocol Logics,” Proc. of the IEEE Computer Society Symp. on Security and Privacy 1994, 14–28.

    Google Scholar 

  17. G. Wedel, Formale Semantik für Authentifikationslogiken, Diplomarbeit FB Mathematik der RWTH Aachen, Nov. 1995.

    Google Scholar 

  18. G. Wedel, V. Kessler, “Formal Semantics for Authentication Logics,” Computer Security — ESORICS 96, Rome, Springer LNCS 1146, 1996, 219–241.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Alexander W. Röhm Dirk Fox Rüdiger Grimm Detlef Schoder

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Friedr. Vieweg & Sohn Verlagsgesellschaft mbH, Braunschweig/Wiesbaden

About this chapter

Cite this chapter

Kessler, V., Neumann, H. (1999). Eine korrekte Authentifikationslogik zur Analyse von Electronic-Commerce-Protokollen. In: Röhm, A.W., Fox, D., Grimm, R., Schoder, D. (eds) Sicherheit und Electronic Commerce. DuD-Fachbeiträge. Vieweg+Teubner Verlag. https://doi.org/10.1007/978-3-322-84901-4_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-322-84901-4_2

  • Publisher Name: Vieweg+Teubner Verlag

  • Print ISBN: 978-3-528-03139-8

  • Online ISBN: 978-3-322-84901-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics