Secure Process Algebra

01/13/2021
by   Yong Wang, et al.
0

Based on our previous work on truly concurrent process algebras APTC, we use it to verify the security protocols. This work (called Secure APTC, abbreviated SAPTC) have the following advantages in verifying security protocols: (1) It has a firmly theoretic foundations, including equational logics, structured operational semantics, and axiomatizations between them; (2) It has rich expressive powers to describe security protocols. Cryptographic operations are modeled as atomic actions and can be extended, explicit parallelism and communication mechanism to modeling communication operations and principals, rich computational properties to describing computational logics in the security protocols, including conditional guards, alternative composition, sequential composition, parallelism and communication, encapsulation and deadlock, recursion, abstraction. (3) Especially by abstraction, it is convenient and obvious to observe the relations between the inputs and outputs of a security protocols, including the relations without any attack, the relations under each known attack, and the relations under unknown attacks if the unknown attacks can be described.

READ FULL TEXT
research
07/01/2020

Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses

It is of folkloric belief that the security of classical cryptographic p...
research
04/11/2019

Privacy protocols

Security protocols enable secure communication over insecure channels. P...
research
04/10/2023

On Kleene Algebra vs. Process Algebra

We try to clarify the relationship between Kleene algebra and process al...
research
11/22/2022

Modeling Resources in Permissionless Longest-chain Total-order Broadcast

Blockchain protocols implement total-order broadcast in a permissionless...
research
04/12/2021

Actors – A Process Algebra Based Approach

We model actors based on truly concurrent process algebra, and capture t...
research
06/27/2018

Verifying Security Protocols using Dynamic Strategies

Current formal approaches have been successfully used to find design fla...
research
04/22/2019

Strand Spaces with Choice via a Process Algebra Semantics

Roles in cryptographic protocols do not always have a linear execution, ...

Please sign up or login with your details

Forgot password? Click here to reset