Part of this paper was presented on the Sixth International ICST Conference on Communications and Networking in China, Harbin, China, August 2011.
SPECIAL ISSUE PAPER
Protocol Derivation System for the Needham–Schroeder family†
Article first published online: 25 JUN 2012
Copyright © 2012 John Wiley & Sons, Ltd.
Security and Communication Networks
How to Cite
Zhang, J., Ma, J. and Yang, C. (2012), Protocol Derivation System for the Needham–Schroeder family. Security Comm. Networks. doi: 10.1002/sec.565
- Article first published online: 25 JUN 2012
- Major National S&T Program. Grant Number: 2011ZX03005-002
- National Natural Science Foundation of China. Grant Number: U1135002, 61100230, 61100233, 61173135
- Natural Science Basic Research Plan in Shaanxi Province of China. Grant Number: 2011JQ8003
- Fundamental Research Funds for the Central Universities
- network security;
- Needham–Schroeder family;
A framework consisting of the Protocol Derivation System (PDS) and the Protocol Composition Logic (PCL) has been recently proposed by Datta et al. for the design and analysis of a secure composition of cryptographic protocols. However, the PDS in this proposed framework can only be used for the protocols of the Station-to-Station family, which are signature-based authenticated Diffie–Hellman key exchange protocols. In this paper, the PDS is extended to support key exchange protocols using a trusted third party and an encryption-based authentication such as those in the Needham–Schroeder family. This is achieved by means of adding new components, refinements, and transformations to the PDS. In addition, the PCL is applied to prove the correctness of the derived protocols. Then, the derivation graph of the Needham−Schroeder family is developed by using the extended PDS. Finally, the derivations and proofs of the protocols in the Needham–Schroeder family are shown in this paper. Copyright © 2012 John Wiley & Sons, Ltd.