Automatic implementation system of security protocols based on formal description techniques

L. Mengual1, N. Barcia1, E. Jimenez2,1, E. Menasalvas1, J. Setien1, J. Yaguez1
1DLSIIS, U.P.M., Madrid, Spain
2Spain

Tóm tắt

We present an automatic implementation system of security protocols based in formal description techniques. A sufficiently complete and concise formal specification that has allowed us to define the state machine that corresponds to a security protocol has been designed to achieve our goals. This formal specification makes it possible to incorporate in a flexible way the security mechanisms and functions (random numbers generation, timestamps, symmetric-key encryption, public-key cryptography, etc). Our solution implies the incorporation of an additional security layer LEI (Logical Element of Implementation) in the TCP/IP architecture. This additional layer be able both to interpret and to implement any security protocol from its formal specification. Our system provides an applications programming interface (API) for the development of distributed applications in the Internet like the e-commerce, bank transfers, network management or distribution information services that makes transparent to them the problem of security in the communications.

Từ khóa

#Formal specifications #Cryptographic protocols #Communication system security #Information security #Random number generation #Public key cryptography #TCPIP #IP networks #Web and internet services #Information management

Tài liệu tham khảo

10.1016/S0141-9331(01)00102-8 0 10.1016/S1389-1286(01)00155-4 10.1016/S0140-3664(00)00246-2 0 stallings, 1999, Cryptography and Network Security 10.1016/S0140-3664(00)00247-4 1991, Formal description techniques and security standard conformance testing, National Physical Lab Teddington England Div of Information Technology and Computing, 34 mengual, 1998, Un modelo formal para la especificacio?n, ana?lisis, verificacio?n e implementacio?n de protocolos de seguridad, Tesis Doctoral F I Universidad Polite?cnica de Madrid trcek, 2000, Security policy conceptual modeling and formalization for networked information systems, Computers Comunications, 23 1991, Harmonized Criteria 1985, Trusted Computer System Evaluation Criteria 10.1016/S0140-3664(99)00239-X mengual, 1999, A model to specify security protocols on the isdn, Journal of Applied Computer Science, 7 10.1016/S0920-5489(00)00047-7 10.1016/S0167-4048(97)00001-1 10.1016/S0167-4048(99)80115-1 lampard, 1991, Formal description techniques in data security: An evaluation and comparison, National Physical Lab Teddington England Div of Information Technology and Computing, 59 yagu?ez, 0, An innovative distributed identity delegation, Journal of Applied Computer Science, 173