25.01.2014 Views

Fulltext - International Journal of Computer Technology and ...

Fulltext - International Journal of Computer Technology and ...

Fulltext - International Journal of Computer Technology and ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Sanjay Kumar Sonkar et al ,Int.J.<strong>Computer</strong> <strong>Technology</strong> & Applications,Vol 3 (2), 525-531<br />

IV. Related Work<br />

Early work on linking Dolev-Yao models <strong>and</strong> cryptography<br />

only considered passive attacks, <strong>and</strong> therefore cannot make<br />

general statements about protocols. A Cryptographic<br />

justification for a Dolev-Yao model in the sense <strong>of</strong> under<br />

active attacks <strong>and</strong> within arbitrary surrounding interactive<br />

protocols [29][30].<br />

Diminishing the distance between the computational <strong>and</strong><br />

logic treatment <strong>of</strong> Cryptography has been the subject <strong>of</strong><br />

many recent research efforts. The works which are more<br />

closely related to our paper, which present a simple logic for<br />

reasoning about the security protocols written in a language<br />

similar to ours, but only for the case <strong>of</strong> passive adversaries.<br />

Other approaches to bridging the logic <strong>and</strong> computational<br />

models <strong>of</strong> cryptography have also been considered in the<br />

literature, but they all seem considerably more complex. The<br />

notions <strong>of</strong> probability, polynomial bounded computation,<br />

<strong>and</strong> computational in distinguish ability are incorporated in<br />

a process calculus, <strong>and</strong> security is defined in terms <strong>of</strong><br />

observational equivalence on processes.<br />

Work is in progress regarding formulation <strong>of</strong> mathematical<br />

model for syntactic approach dealing with probability <strong>and</strong><br />

polynomial-time [14] considerations <strong>and</strong> encoding them into<br />

pro<strong>of</strong> tools, in particular. This is equivalent to the work <strong>of</strong><br />

justifying Dolev-Yao models, which <strong>of</strong>fer a higher level <strong>of</strong><br />

abstractions <strong>and</strong> thus much simpler pro<strong>of</strong>s where applicable,<br />

so that pro<strong>of</strong>s <strong>of</strong> larger systems can be automated.<br />

V. Conclusion<br />

On the macroscopic view, we come across the various<br />

security measures involved in security protocol pro<strong>of</strong>s. This<br />

paper properly deals with all the computational technique<br />

which can overcome all the day by day new developments<br />

in cryptographic field.<br />

This paper reflects logical formal pro<strong>of</strong>s <strong>of</strong> security<br />

protocols into the computational model. The formal pro<strong>of</strong>s<br />

are easy with respect to computational model as we don’t<br />

have to consider the probabilistic distribution <strong>and</strong><br />

asymptotic notations. The security properties are expressed<br />

in terms simple logic based language using syntactic<br />

expressions <strong>and</strong> are then interpreted in a computational<br />

setup. Also these formal pro<strong>of</strong> are sound as any active<br />

adversaries can extract information from messages if the<br />

statement hold true for any symbolic execution. Therefore,<br />

we need such a framework for the interpretation <strong>of</strong> formal<br />

pro<strong>of</strong> into cryptographic system so as to develop more <strong>and</strong><br />

more secure communication systems.<br />

VI. Future Work<br />

1. Considering execution models in which we can extend<br />

instances not <strong>of</strong> a single but <strong>of</strong> a set <strong>of</strong> protocols if they<br />

are developed in future.<br />

2. Developing a more general execution model involving<br />

reactive clients.<br />

3. Generalize our abstract definition <strong>of</strong> security notions to<br />

capture secrecy properties.<br />

4. Augmenting the BPW model with tailored protocol<br />

logics to further simplify modular reasoning.<br />

5. Underst<strong>and</strong>ing the relation <strong>of</strong> correctness pro<strong>of</strong>s <strong>of</strong><br />

(commercial) protocols in MSR <strong>and</strong> in the BPW<br />

model.<br />

VII. References<br />

ISSN:2229-6093<br />

[1] E. S. Cohen, “Information transmission in<br />

computational systems,” ACM SIGOPS Operating<br />

Systems Review, vol. 11, no. 5, pp. 133–139, 1977.<br />

[2] J. McLean, “Security models <strong>and</strong> information<br />

flow,” in Proc. IEEE Symp. on Security <strong>and</strong><br />

Privacy, May 1990, pp. 180–187.<br />

[3] Focardi <strong>and</strong> R. Gorrieri, “A classification <strong>of</strong><br />

security properties for process algebras,” J.<br />

<strong>Computer</strong> Security, vol. 3, no. 1, pp. 5–33, 1995.<br />

[4] D. Song. An automatic checker for security<br />

protocol analysis. In 12th IEEE <strong>Computer</strong> Security<br />

Foundations Workshop, June 1999.<br />

[5] D. Kozen, “Language-based security,” in Proc.<br />

Mathematical Foundations <strong>of</strong> <strong>Computer</strong> Science.<br />

Sept. 1999, vol. 1672 <strong>of</strong> LNCS, pp. 284– 298,<br />

Springer-Verlag.<br />

[6] Aldini, “Probabilistic information flow in process<br />

algebra,” in Proc. CONCUR’01. Aug. 2001, vol.<br />

2154 <strong>of</strong> LNCS, pp. 152–168, Springer-Verlag.<br />

[7] Michele Boreale. Symbolic trace analysis <strong>of</strong><br />

cryptographic protocols. In 28th Colloquium on<br />

Automata, Languages <strong>and</strong> Programming (ICALP),<br />

LNCS. Springer, July 2001.<br />

[8] M. Zanotti, “Security typings by abstract<br />

interpretation,” in Proc.Symposium on Static<br />

Analysis. Sept. 2002, vol. 2477 <strong>of</strong> LNCS, pp. 360–<br />

375, Springer-Verlag.<br />

[9] M. Backes <strong>and</strong> B. Pfitzmann. A cryptographically<br />

sound security pro<strong>of</strong> <strong>of</strong> the Needham-Schroeder-<br />

Lowe public-key protocol. Available as Cryptology<br />

ePrint Archive, Report 2003/121.<br />

[10] M. Backes, B. Pfitzmann, <strong>and</strong> M. Waidner. A<br />

universally composable cryptographic library.<br />

Available as Cryptology ePrint Archive, Report<br />

2003/015.<br />

[11] M. Backes <strong>and</strong> B. Pfitzmann. Symmetric<br />

Encryption in a simulatable Dolev-Yao style<br />

cryptographic library. In Proceedings <strong>of</strong> the 17th<br />

<strong>Computer</strong> Security Foundations Workshop, pages<br />

204{218. IEEE <strong>Computer</strong> Society, June 2004.<br />

[12] Iliano Cervesato, Aaron D. Jaggard, Andre<br />

Scedrov, <strong>and</strong> Christopher Walstad. Specifying<br />

Kerberos 5 Cross-Realm Authentication. In Proc.<br />

WITS’05, pages 12–26. ACM Digital Lib., 2005.<br />

[13] V`eronique Cortier <strong>and</strong> Bogdan Warinschi.<br />

Computationally sound, automated pro<strong>of</strong>s for<br />

security protocols. In Proc. 14th European<br />

529

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!