Abstract
We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptography” of the spi-calculus by taking time into account. This involves defining an operational semantics, defining a control flow analysis (CFA) in the form of a flow logic, and proving semantic correctness. Our first result is that secrecy in the sense of Dolev-Yao can be expressed in terms of the CFA. Our second result is that also non-interference in the sense of Abadi can be expressed in terms of the CFA; unlike Abadi we find the non-interference property to be an extension of the Dolev-Yao property.
The first two authors have been partially supported by the Progetti MURST TOSCA and AI, TS & CFA.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
M. Abadi. Secrecy by Typing In Security protocols. Journal of the ACM, 5(46):18–36, September 1999.
M. Abadi. Security protocols and specifications. In FoSSaCS’99, LNCS 1578, pages 1–13. Springer, 1999.
M. Abadi, C. Fournet. Mobile Values, New names, and Secure Communication. In POPL’01, ACM, 2001.
M. Abadi, B. Blanchet. Secrecy Types for Asymmetric Communication. In FoS-SaCS’01, LNCS 2030, pages 25–41. Springer, 2001.
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols-The Spi calculus. Information and Computation 148,1:1–70, January 1999.
C. Bodei. Security Issues in Process Calculi. PhD thesis, Dipartimento di Infor-matica, Università di Pisa. TD-2/00, March, 2000.
C. Bodei, P. Degano, F. Nielson, and H. Riis Nielson. Static analysis for the π-calculus with their application to security. To appear in I&C Available at http://www.di.unipi.it/~chiara/publ-40/BDNNi00.ps.
C. Bodei, P. Degano, F. Nielson, and H. Riis Nielson. Control flow analysis for the π-calculus. In CONCUR’98, LNCS 1466, pages 84–98. Springer, 1998.
D. Bolignano. An approach to the formal verification of cryptographic protocols. In 3rd ACM Conf. on Computer and Communications Security, pages 106–118. ACM Press, 1996.
M. Boreale and R. De Nicola. Testing equivalence for mobile processes. Information and Computation, 120(2):279–303, August 1995.
L. Cardelli and A.D. Gordon. Types for mobile ambients. In POPL’99, pages 79–92. ACM Press, 1999.
R. De Nicola, G. Ferrari, and R. Pugliese, B. Venneri. Types for access control. Theoretical Computer Science 240(1): 215–254, June 2000.
R. De Nicola and M.C.B. Hennessy. Testing equivalence for processes. Theoretical Computer Science, 34:83–133, 1984.
D. E. Denning. A Lattice Model of Secure Information Flow. Communications of the ACM, pages 236–243, May 1976.
D. E. Denning and P. J. Denning. Certification of Programs for Secure Information Flow. Communications of the ACM, pages 504–513, July 1977.
D. Dolev and A.C. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(12):198–208, March 1983.
J.A. Goguen and J. Meseguer. Security policy and security models. In 1982 IEEE Symposium on Research on Security and Privacy, pages 11–20. IEEE Press, 1982.
R. R. Hansen, J. G. Jensen, F. Nielson, and H. R. Nielson. Abstract interpretation of mobile ambients. In SAS’99, LNCS 1694, pages 135–148, 1999.
N. Heintze and J.G Riecke. The SLam calculus: Programming with secrecy and integrity. In POPL’98, pages 365–377. ACM Press, 1998.
J. Jürjens. Bridging the Gap: Formal vs. Complexity-theoretical Reasoning about Cryptography. Security through Analysis and Verification, Dagstuhl Dec. 2000.
F. Nielson and H. R. Nielson. Flow logics and operational semantics. Electronic Notes of Theoretical Computer Science, 10, 1998.
F. Nielson, H. R. Nielson, R. R. Hansen, and J. G. Jensen. Validating firewalls in mobile ambients. In CONCUR’99, LNCS 1664, pages 463–477, 1999.
F. Nielson, H. Seidl. Control-Flow Analysis in Cubic Time. In ESOP’01, LNCS 2028, pages 252–268, 2001.
H. Riis Nielson and F. Nielson. Semantics with Applications: A Formal Introduction. Wiley Professional Computing. Wiley, 1992.
H. Riis Nielson, F. Nielson, H. Seidl. Cryptographic Analysis in Cubic Time. Manuscript, 2001.
L.C. Paulson. Proving properties of security protocols by induction. In CSFW’97, pages 70–83. IEEE, 1997.
J. Riely and M. Hennessy. A typed language for distributed mobile processes. In POPL’98, pages 378–390. ACM Press, 1998.
J. Riely and M. Hennessy. Trust and partial typing in open systems of mobile agents. In POPL’99, pages 93–104. ACM Press, 1999.
D. Volpano and G. Smith. Language Issues in Mobile Program Security. In Mobile Agent Security, LNCS 1419, pages 25–43. Springer, 1998.
D. Volpano and G. Smith. Probabilistic noninterference in a concurrent language. In CSFW’98, pages 34–43. IEEE, 1998.
D. Volpano and G. Smith. Secure information flow in a multi-threaded imperative language. In POPL’98, pages 355–364. ACM Press, 1998.
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4:4–21, 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bodei, C., Degano, P., Nielson, F., Nielson, H.R. (2001). Static Analysis for Secrecy and Non-interference in Networks of Processes. In: Malyshkin, V. (eds) Parallel Computing Technologies. PaCT 2001. Lecture Notes in Computer Science, vol 2127. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44743-1_3
Download citation
DOI: https://doi.org/10.1007/3-540-44743-1_3
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42522-9
Online ISBN: 978-3-540-44743-6
eBook Packages: Springer Book Archive