{"title":"采用基于解释函数的方法对SEP协议进行形式化分析","authors":"Houssam El Ismaili, H. Houmani, Hicham Madroumi","doi":"10.1109/WICT.2015.7489637","DOIUrl":null,"url":null,"abstract":"Electronic payment is the very important step of the electronic business system, and its security must be ensured. The Secure Electronic protocol (SEP) [1] was proposed to protect online payment transactions against the fraud without involving the third party such as Visa or MasterCard. SEP protocol avoids the complexities relating to the implementation unlike SET and 3D-secure, integration and utilization are also easier than before. Then it's crucial to ensure that this protocol respect security properties such as confidentiality, authentication and integrity. In this paper, we analyze the SEP protocol with respect to the confidentiality (secrecy) property. To perform this analysis, we use the interpretation functions-based method [2, 3]. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily life protocols such us SEP.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Formal analysis of SEP protocol using the interpretation function-based method\",\"authors\":\"Houssam El Ismaili, H. Houmani, Hicham Madroumi\",\"doi\":\"10.1109/WICT.2015.7489637\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Electronic payment is the very important step of the electronic business system, and its security must be ensured. The Secure Electronic protocol (SEP) [1] was proposed to protect online payment transactions against the fraud without involving the third party such as Visa or MasterCard. SEP protocol avoids the complexities relating to the implementation unlike SET and 3D-secure, integration and utilization are also easier than before. Then it's crucial to ensure that this protocol respect security properties such as confidentiality, authentication and integrity. In this paper, we analyze the SEP protocol with respect to the confidentiality (secrecy) property. To perform this analysis, we use the interpretation functions-based method [2, 3]. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily life protocols such us SEP.\",\"PeriodicalId\":246557,\"journal\":{\"name\":\"2015 5th World Congress on Information and Communication Technologies (WICT)\",\"volume\":\"56 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 5th World Congress on Information and Communication Technologies (WICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WICT.2015.7489637\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 5th World Congress on Information and Communication Technologies (WICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WICT.2015.7489637","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Formal analysis of SEP protocol using the interpretation function-based method
Electronic payment is the very important step of the electronic business system, and its security must be ensured. The Secure Electronic protocol (SEP) [1] was proposed to protect online payment transactions against the fraud without involving the third party such as Visa or MasterCard. SEP protocol avoids the complexities relating to the implementation unlike SET and 3D-secure, integration and utilization are also easier than before. Then it's crucial to ensure that this protocol respect security properties such as confidentiality, authentication and integrity. In this paper, we analyze the SEP protocol with respect to the confidentiality (secrecy) property. To perform this analysis, we use the interpretation functions-based method [2, 3]. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily life protocols such us SEP.