Security Protocols as Choreographies

Alessandro Bruni, Marco Carbone, Rosario Giustolisi, Sebastian Alexander Mödersheim, Carsten Schürmann

Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

279 Downloads (Pure)

Abstract

A choreography gives a description of how endpoints in a concurrent systems should exchange messages during its execution. In this paper, we informally introduce a choreographic language for describing security protocols and a property language for expressing non-trivial security properties of such protocols. We motivate this work using the envelope protocol [2] as an example, which ensures auditable transfers by means of a TPM, that guarantees that the issuer of a message always learns whether such message has been opened or not. We then take an implementation of the TPM formulated as an API and discuss how such implementation and the usage of the TPM in the protocol can be related. Finally, we illustrate how the protocol and property descriptions can be translated into multiset rewrite rules and metric first order logic respectively, in order to check if auditable transfer holds.

Original languageEnglish
Title of host publicationProtocols, Strands, and Logic : Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday
EditorsDaniel Dougherty, José Meseguer, Sebastian Alexander Mödersheim, Paul Rowe
PublisherSpringer
Publication date2021
Pages98-111
ISBN (Print)978-3-030-91630-5
DOIs
Publication statusPublished - 2021
SeriesLecture Notes in Computer Science
Volume13066
ISSN0302-9743

Keywords

  • Security protocols
  • Choreography
  • Verification

Fingerprint

Dive into the research topics of 'Security Protocols as Choreographies'. Together they form a unique fingerprint.

Cite this