Skip to main content

A Supporting Tool for Spiral Model of Cryptographic Protocol Design with Reasoning-Based Formal Analysis

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 354))

Abstract

Many cryptographic protocols proposed to securely send and receive information with someone in unsecured network for various purposes. To design secure cryptographic protocols, formal analysis for cryptographic protocols should be included as an essential activity in a process of cryptographic protocol design. In other word, the ideal process consists of design, formalization, formal analysis, interpretation, and improvement, and the five activities are done repeatedly as similar as activities in spiral model of software development. This paper presents a supporting tool for the ideal process of cryptographic protocol design. At first, the paper presents the spiral model of cryptographic protocol design, and introduces formal analysis method with reasoning as a suitable formal analysis method for the spiral model. The paper also presents design of the supporting tool and its implementation for key exchange protocols. By the supporting tool, designers can only focus on design and improvement activities in the spiral model.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: 14th IEEE Computer Security Foundations Workshop, pp. 82–96. IEEE (2001)

    Google Scholar 

  2. Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer, Berlin (2003)

    Google Scholar 

  3. Cheng, J.: A strong relevant logic model of epistemic processes in scientific discovery. Inf. Modell. Knowl. Bases XI 61, 136–159 (2000)

    Google Scholar 

  4. Cheng, J., Miura, J.: Deontic relevant logic as the logical basis for specifying, verifying, and reasoning about information security and information assurance. In: Proceedings of the 1st International Conference on Availability, Reliability and Security, pp. 601–608. Vienna (2006)

    Google Scholar 

  5. Cheng, J., Nara, S., Goto Y.: FreeEnCal: a forward reasoning engine with general-purpose. In: Knowledge-Based Intelligent Information and Engineering Systems. Lecture Notes in Artificial Intelligence, vol. 4693, pp. 444–452. Springer, Berlin (2007)

    Google Scholar 

  6. Clark, J., Jacob, J.: A survey of authentication protocol literature: version 1.0. http://www.cs.york.ac.uk/~jac/ (1997)

  7. Cremers, C.: The Scyther Tool: verification, falsification, and analysis of security protocols. In: Proceedings of the 20th International Conference on Computer Aided Verification. Lecture Notes in Computer Science, vol. 5123, pp. 414–418. Springer, Heidelberg (2008)

    Google Scholar 

  8. Diaconescu, R., Futatsugi, K.: CafeOBJ Report. AMAST Series in Computing, vol. 6. World Scientific, Singapore (1998)

    Google Scholar 

  9. Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM 21(12), 993–999 (1978)

    Google Scholar 

  10. Otway, D., Rees, O.: Efficient and timely mutual authentication. ACM SIGOPS Operating Syst. Rev. 21(1), 8–10 (1987)

    Google Scholar 

  11. Paulson, L.C.: Isabelle: a generic theorem prover. In: Lecture Notes in Computer Science, vol. 828. Springer, Berlin (1994)

    Google Scholar 

  12. Schneier, B.: Applied Cryptography. In: Schneier, B. (ed.) Protocols, Algorithms, and Source Code in C. Wiley, New York (1996)

    Google Scholar 

  13. Wagatsuma, K., Anze, S., Goto, Y., Cheng, J.: Formalization for formal analysis of cryptographic protocols with reasoning approach. In: Future Information Technology. Lecture Notes in Electrical Engineering, vol. 309, pp. 211–218. Springer, Heidelberg (2014)

    Google Scholar 

  14. Wagatsuma, K., Goto, Y., Cheng, J.: A formal analysis method with reasoning for key exchange protocols. IPSJ J. (in Japanese) 56(3), 903–910 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jingde Cheng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wagatsuma, K., Harada, T., Anze, S., Goto, Y., Cheng, J. (2016). A Supporting Tool for Spiral Model of Cryptographic Protocol Design with Reasoning-Based Formal Analysis. In: Park, J., Chao, HC., Arabnia, H., Yen, N. (eds) Advanced Multimedia and Ubiquitous Engineering. Lecture Notes in Electrical Engineering, vol 354. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47895-0_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-47895-0_4

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-47894-3

  • Online ISBN: 978-3-662-47895-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics