Automatic implementation system of security protocols based on formal description techniques
Tóm tắt
We present an automatic implementation system of security protocols based in formal description techniques. A sufficiently complete and concise formal specification that has allowed us to define the state machine that corresponds to a security protocol has been designed to achieve our goals. This formal specification makes it possible to incorporate in a flexible way the security mechanisms and functions (random numbers generation, timestamps, symmetric-key encryption, public-key cryptography, etc). Our solution implies the incorporation of an additional security layer LEI (Logical Element of Implementation) in the TCP/IP architecture. This additional layer be able both to interpret and to implement any security protocol from its formal specification. Our system provides an applications programming interface (API) for the development of distributed applications in the Internet like the e-commerce, bank transfers, network management or distribution information services that makes transparent to them the problem of security in the communications.
Từ khóa
#Formal specifications #Cryptographic protocols #Communication system security #Information security #Random number generation #Public key cryptography #TCPIP #IP networks #Web and internet services #Information managementTài liệu tham khảo
10.1016/S0141-9331(01)00102-8
0
10.1016/S1389-1286(01)00155-4
10.1016/S0140-3664(00)00246-2
0
stallings, 1999, Cryptography and Network Security
10.1016/S0140-3664(00)00247-4
1991, Formal description techniques and security standard conformance testing, National Physical Lab Teddington England Div of Information Technology and Computing, 34
mengual, 1998, Un modelo formal para la especificacio?n, ana?lisis, verificacio?n e implementacio?n de protocolos de seguridad, Tesis Doctoral F I Universidad Polite?cnica de Madrid
trcek, 2000, Security policy conceptual modeling and formalization for networked information systems, Computers Comunications, 23
1991, Harmonized Criteria
1985, Trusted Computer System Evaluation Criteria
10.1016/S0140-3664(99)00239-X
mengual, 1999, A model to specify security protocols on the isdn, Journal of Applied Computer Science, 7
10.1016/S0920-5489(00)00047-7
10.1016/S0167-4048(97)00001-1
10.1016/S0167-4048(99)80115-1
lampard, 1991, Formal description techniques in data security: An evaluation and comparison, National Physical Lab Teddington England Div of Information Technology and Computing, 59
yagu?ez, 0, An innovative distributed identity delegation, Journal of Applied Computer Science, 173
