Skip to main content

Formal specification and verification of secure communication protocols

  • Section 3 Network Security
  • Conference paper
  • First Online:
Advances in Cryptology — AUSCRYPT '90 (AUSCRYPT 1990)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 453))

Included in the following conference series:

Abstract

The worlds growing dependency on telecommunications is a fact. The different networks give efficient and user friendly services to a large number of users. With adequate security measures in terms of confidentiality, authentication functions and signature capabilities, the functionality of the networks will be greatly enhanced, and the users would experience a better quality of service. The full benefit of the future ISDN will only be reachable with security features built into both the application layer protocols and protocols at one or more of the other architectural layers. The formal methods to be used to do the actual implementations will be topics for further research and development, because none of the existing formal description, construction and verification methods are fully adequate for this very complex task.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ISO International Standard — Information Processing Systems — OSI Reference Model — Part 2: Security Architecture.

    Google Scholar 

  2. Information Processing Systems — Open Systems Interconnection — Basic Reference Model.

    Google Scholar 

  3. Information Processing Systems — Open Systems Interconnection — Specification of Abstract Syntax Notation One (ASN.1). CCITT Recommendation X.208. Blue Book 1988.

    Google Scholar 

  4. Functional Specification and Description Language (SDL). CCITT Recommendations Z.101. Blue Book 1988.

    Google Scholar 

  5. Wheeler, “Numerical petri nets — a definition,” Tech. Rep. Technical Report 7780, Telecom Australia Research Laboratories, 1985.

    Google Scholar 

  6. PROTEAN: A Specification and Verification Aid for Communication Protocols. Telecom Research Laboratories Branch Paper SS0113, 1987.

    Google Scholar 

  7. M. Burrows, M. Abadi, and R. Needham, “Authentication: A practical study in belief and action,” Tech. Rep. Technical Report 138, University of Cambridge Computer Laboratory, 1988.

    Google Scholar 

  8. D. M. Berry, “Towards a formal basis for the formal development method and the ina jo specification language,” IEEE Transactions on Software Engineering, vol. SE-13, Feb 1987.

    Google Scholar 

  9. J. K. Millen, S. C. Clark, and S. B. Freedman, “The interrogator: Protocol security analysis,” IEEE Transactions on Software Engineering, vol. SE-13, pp. 274–296, Feb 1987.

    Google Scholar 

  10. U. Cleghorn, “ASNST: An abstract syntax notation — one support tool,” Computer Communications, vol. 12, Oct 1989.

    Google Scholar 

  11. S. Andresen, S. Haug, and T. Bechman, “Sikring i MHS,” Tech. Rep. Report STF44 F88040, Elab, 1988.

    Google Scholar 

  12. ISO International Standard — Information Processing — Data Encipherment — Physical layer Interoperability Requirements.

    Google Scholar 

  13. ISO/IEC/JTC1/SC20/WG3 Working Document — Data Cryptographic Techniques — Conditions for Practical Operation in the Network Layer.

    Google Scholar 

  14. Data Integrity Mechanism Using a Cryptographic Check Function Employing an N-Bit Algorithm with Truncation. ISO Draft International Standard 1988.

    Google Scholar 

  15. Conformance Testing. CCITT Recommendation X.290. Blue Book 1988.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jennifer Seberry Josef Pieprzyk

Rights and permissions

Reprints and permissions

Copyright information

© 1990 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Knapskog, S.J. (1990). Formal specification and verification of secure communication protocols. In: Seberry, J., Pieprzyk, J. (eds) Advances in Cryptology — AUSCRYPT '90. AUSCRYPT 1990. Lecture Notes in Computer Science, vol 453. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0030352

Download citation

  • DOI: https://doi.org/10.1007/BFb0030352

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-53000-8

  • Online ISBN: 978-3-540-46297-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics