Security Protocols

The term ‘principal’ has roots both in computer security and in communications security. We will show that in those two areas principals serve quite different purposes. We also note that the term principal is overloaded in computer security and propose a separation into three different aspects: origin of message, access control rule, and accountable entity. Furthermore, we will defend the merits of extensional security specifications and show that it is not fruitful to expect that security mechanisms can only have one ‘correct’ interpretation.

[1]  Mihir Bellare,et al.  Provably secure session key distribution: the three party case , 1995, STOC '95.

[2]  Lawrence C. Paulson,et al.  The Inductive Approach to Verifying Cryptographic Protocols , 2021, J. Comput. Secur..

[3]  Geraint Price,et al.  The interaction between fault tolerance and security , 1999 .

[4]  Michael K. Reiter,et al.  Distributing trust with the Rampart toolkit , 1996, CACM.

[5]  M. Kuhn,et al.  The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .

[6]  Giampaolo Bella Inductive Verification of Smart Card Protocols , 2003, J. Comput. Secur..

[7]  Giampaolo Bella Modelling Agents' Knowledge Inductively , 1999, Security Protocols Workshop.

[8]  Gavin Lowe,et al.  An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..

[9]  Michael K. Reiter,et al.  Secure agreement protocols: reliable and atomic group multicast in rampart , 1994, CCS '94.

[10]  Michael K. Reiter,et al.  The Rampart Toolkit for Building High-Integrity Services , 1994, Dagstuhl Seminar on Distributed Systems.

[11]  Silvio Micali,et al.  Secret-key agreement without public-key , 1994, CRYPTO 1994.

[12]  Peter Honeyman,et al.  Implementation of a Provably Secure, Smartcard-Based Key Distribution Protocol , 1998, CARDIS.

[13]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[14]  Fred B. Schneider,et al.  Implementing fault-tolerant services using the state machine approach: a tutorial , 1990, CSUR.

[15]  Martín Abadi,et al.  Prudent Engineering Practice for Cryptographic Protocols , 1994, IEEE Trans. Software Eng..