+ All Categories
Home > Documents > CIMPA School on Security Specification and verification of randomized security protocols Lecture 2

CIMPA School on Security Specification and verification of randomized security protocols Lecture 2

Date post: 30-Dec-2015
Category:
Upload: ira-levy
View: 25 times
Download: 0 times
Share this document with a friend
Description:
CIMPA School on Security Specification and verification of randomized security protocols Lecture 2. Catuscia Palamidessi, INRIA & LIX [email protected] www.lix.polytechnique.fr/~catuscia Page of the course: www.lix.polytechnique.fr/~catuscia/teaching/CIMPA_School_05/. - PowerPoint PPT Presentation
Popular Tags:
12
Bangalore, 2 Feb 2005 Probabilistic security proto cols 1 CIMPA School on Security Specification and verification of randomized security protocols Lecture 2 Catuscia Palamidessi, INRIA & LIX [email protected] www.lix.polytechnique.fr/~catuscia Page of the course: www.lix.polytechnique.fr/~catuscia/teaching/ CIMPA_School_05/
Transcript
Page 1: CIMPA School on Security Specification and verification of randomized security protocols Lecture 2

Bangalore, 2 Feb 2005 Probabilistic security protocols 1

CIMPA School on Security

Specification and verification of randomized security

protocols

Lecture 2

Catuscia Palamidessi, INRIA & LIX

[email protected]

www.lix.polytechnique.fr/~catuscia

Page of the course:

www.lix.polytechnique.fr/~catuscia/teaching/CIMPA_School_05/

Page 2: CIMPA School on Security Specification and verification of randomized security protocols Lecture 2

Bangalore, 2 Feb 2005 Probabilistic security protocols 2

Plan of the course

• Overview of the basic notions of Probability theory and Measure theory

• Probabilistic automata

• Probabilistic -calculus

• Applications to the specification and verification of randomized security protocols– Anonymity

– Fair exchange

Page 3: CIMPA School on Security Specification and verification of randomized security protocols Lecture 2

Bangalore, 2 Feb 2005 Probabilistic security protocols 3

Randomized security protocols• A certain number of security protocols use randomized primitives

– Anonymity:

• Crowds [Reiter and Rubin,1998],

– anonymous communication (anonymity of the sender)

• Onion Routing [Syverson, Goldschlag and Reed, 1997]

– anonymous communication

• Freenet [Clarke et al. 2001]

– anonymous information storage and retrieval

– Fairness

• Probabilistic Contract Signing protocol [Ben-Or et al., 1990]

• Probabilistic non-repudiation protocol [Markowitch and Roggeman, 1999]

• Partial Secrets Exchange protocol [Even, Goldreich and Lempel, 1985]

Page 4: CIMPA School on Security Specification and verification of randomized security protocols Lecture 2

Bangalore, 2 Feb 2005 Probabilistic security protocols 4

The probabilistic -calculus

References:

• O.M. Herescu, C. Palamidessi. Probabilistic asynchronous -calculus. In J. Tiuryn, ed., Proc. of FOSSACS 2000 (Part of ETAPS 2000), vol. 1784 of LNCS, pages 146--160. Springer-Verlag, 2000. www.lix.polytechnique.fr/~catuscia/papers/Prob_asy_pi/report.ps

• C. Palamidessi, O.M. Herescu. A Randomized Distributed Encoding of the -Calculus with Mixed Choice. To appear in Theoretical Computer Science (short version in Proc. of IFIP-TCS 2002, pages 537-549, Kluwer, 2002.)www.lix.polytechnique.fr/~catuscia/papers/prob_enc/report.ps

Page 5: CIMPA School on Security Specification and verification of randomized security protocols Lecture 2

Bangalore, 2 Feb 2005 Probabilistic security protocols 5

The probabilistic -calculus

• Originally developed as an intermediate language for the fully distributed implementation of the -calculus

– The mixed choice mechanism of the p-calculus cannot be implemented in a fully distributed way deterministically, but can be done in a randomized way. Correctness is achieved with probability 1.

• Presently, we use it as a framework to model the correctness of security protocols:

– to specify security properties which require a probabilistic formulation,

– to represent randomized security protocols

– to prove their correctness, i.e. t verify that they satisfy the intended properties

Page 6: CIMPA School on Security Specification and verification of randomized security protocols Lecture 2

Bangalore, 2 Feb 2005 Probabilistic security protocols 6

The probabilistic -calculus: syntax

Similar to the asynchronous p-calculus of Amadio,Castellani and Sangiorgi, the only difference is that the input-guarded choice is probabilistic

input | silent action

inactionprobabilistic choiceoutput parallelnew namereplication

Page 7: CIMPA School on Security Specification and verification of randomized security protocols Lecture 2

Bangalore, 2 Feb 2005 Probabilistic security protocols 7

The probabilistic -calculus: operational sem

• Based on the probabilistic automata of Segala and Lynch

• nondeterministic and probabilistic behavior

• nondeterminism associated to a scheduler (adversary)

• probabilistic behavior associated to the choice of the process

– groups, probabilistic distributions, steps

1/2

1/21/3

1/31/3

1/32/3

1/2

1/21/3

1/31/3

1/32/3

1/2

1/21/3

1/31/3

1/32/3

steps

Page 8: CIMPA School on Security Specification and verification of randomized security protocols Lecture 2

Bangalore, 2 Feb 2005 Probabilistic security protocols 8

The probabilistic -calculus: operational sem

1 2 np1 p2

pn

Page 9: CIMPA School on Security Specification and verification of randomized security protocols Lecture 2

Bangalore, 2 Feb 2005 Probabilistic security protocols 9

The probabilistic -calculus: operational sem

Page 10: CIMPA School on Security Specification and verification of randomized security protocols Lecture 2

Bangalore, 2 Feb 2005 Probabilistic security protocols 10

The probabilistic -calculus: operational sem

Page 11: CIMPA School on Security Specification and verification of randomized security protocols Lecture 2

Bangalore, 2 Feb 2005 Probabilistic security protocols 11

The probabilistic -calculus: operational sem

Page 12: CIMPA School on Security Specification and verification of randomized security protocols Lecture 2

Bangalore, 2 Feb 2005 Probabilistic security protocols 12

The probabilistic -calculus: operational sem


Recommended