{"title":"Extension and application of protocol composition logic","authors":"Ziyi You, Juntao Li, Xiaoyao Xie","doi":"10.1109/ICCET.2010.5485720","DOIUrl":null,"url":null,"abstract":"Protocol Composition Logic (PCL) is a logic for proving security properties of network protocols that use public and symmetric key cryptography. Because the PCL composition theorems support compositional reasoning about security protocols, including parallel composition of different protocols, and sequential composition of protocol steps, it is particularly useful in carrying out larger-scale security protocol studies. In this paper, PCL is extened by strand space model(SSM) and temporal logic (TL) to better describe and verify complex protocols. Based on improved PCL, the TLS protocol is verified as an example and proved to satisfy authentication property.","PeriodicalId":271757,"journal":{"name":"2010 2nd International Conference on Computer Engineering and Technology","volume":"52 1-2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 2nd International Conference on Computer Engineering and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCET.2010.5485720","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Protocol Composition Logic (PCL) is a logic for proving security properties of network protocols that use public and symmetric key cryptography. Because the PCL composition theorems support compositional reasoning about security protocols, including parallel composition of different protocols, and sequential composition of protocol steps, it is particularly useful in carrying out larger-scale security protocol studies. In this paper, PCL is extened by strand space model(SSM) and temporal logic (TL) to better describe and verify complex protocols. Based on improved PCL, the TLS protocol is verified as an example and proved to satisfy authentication property.