Protocol-Independent Secrecy

Published in the proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May, 2000.

Authors

Jon Millen and Harald Rueß

Abstract

Inductive proofs of secrecy invariants for cryptographic protocols can be facilitated by separating the protocol-dependent part from the protocol-independent part. Our Secrecy theorem encapsulates the use of induction so that the discharge of protocol-specific proof obligations is reduced to first-order reasoning. Secrecy proofs for Otway-Rees and the corrected Needham-Schroeder protocol are given.

gzipped postscript or postscript

BibTeX Entry

@InProceedings{MillenRuess:Oakland2000,
  author =       {Jon Millen and Harald Rue{\ss}},
  title =        {Protocol-independent secrecy},
  booktitle =    {2000 IEEE Symposium on Security and Privacy},
  month = {May},
  year =         2000,
  organization = {IEEE Computer Society}
}


Harald Ruess: ruess@csl.sri.com