Items related to The Modelling and Analysis of Security Protocols: The...

The Modelling and Analysis of Security Protocols: The Csp Approach - Softcover

 
9780201674712: The Modelling and Analysis of Security Protocols: The Csp Approach

Synopsis

(Pearson Education) A thorough and detailed explanation of the most common and effective approaches to the design and analysis of security critical systems. Describes the role of security protocols, exposing their strengths and weaknesses. Covers each different kind of protocol in detail, touching on key concepts such as confidentiality and integrity. Softcover.

"synopsis" may belong to another edition of this title.

From the Inside Flap

The value of information and the power that it can convey has long been recognized. Now, more than ever, information is a driver of society and its integrity, confidentiality and authenticity must be ensured.

Security protocols are a critical element of the infrastructures needed for

the secure communication and processing of information. They are, of course,

not the only components needed to ensure such security properties: for example,

good cryptographic algorithms and systems security measures to protect key material

are also needed. Protocols can however be thought of as the keystones of a secure

architecture: they allow agents to authenticate each other, to establish fresh

session keys to communicate confidentially, to ensure the authenticity of data

and services, and so on.

Aims of the book

This book is about the role of security protocols, how they work, the security

properties they are designed to ensure and how to design and analyze them.

It was recognized very early on, almost as soon as they were conceived, that

the design and analysis of security protocols was going to be a very delicate

and error-prone process. Security protocols are deceptively simple-looking objects

that harbour surprising subtleties and flaws. Attempts to develop frameworks

and tools to reason about their properties goes back over 20 years, but the

topic remains a highly active and fruitful one in the security research community.

An overview of the historical background can be found in Chapter 9.

In this book we present the particular approach to security protocol verification

that has been developed by the authors. It was the first to apply process algebra

and model-checking to the problem. The process algebra in question is CSP (Communicating

Sequential Processes).

There is a widespread misconception that pouring liberal libations of cryptographic

algorithms over an architecture will render it secure. Certainly, good cryptographic

algorithms are important but, as we will see, it is quite possible to have an

architecture employing high grade algorithms that is still wide open to exploitation

due to poor protocol design.

We hope that our readers will come away with a good understanding of the role

of security protocols, how they work and the kinds of vulnerabilities to which

they are prey. In particular we hope that they will better appreciate the subtleties

in making precise the security goals that such protocols are intended to ensure

and the importance of making these goals - as well as the assumptions about

the underlying mechanisms and environment - precise.

Ideally we hope that the reader will gain sufficient understanding (and enthusiasm!)

to apply the tools and techniques presented here to their own protocols, real

or imaginary. Perhaps also some readers will be sufficiently intrigued to go

on to pursue research into some of the open problems that remain in this challenging

and fascinating area.

Structure of the book

This book is concerned with the particular approach to analysis and verification

of security protocols based around the process algebra CSP. There are a number

of facets to this approach, and the book uses a running example, the Yahalom

protocol, to link the material.

The Introduction introduces the general topic of security protocols. It covers

the issues that arise in their design, the cryptographic mechanisms that are

used in their construction, the properties that they are expected to have, and

the kinds of attacks that can be mounted to subvert them. It also discusses

the CSP approach and the tool support. The chapter introduces the Yahalom protocol

and several other protocol examples.

Chapter 1 provides a general introduction to the main aspects of CSP relevant

to the approach. CSP consists of a language and underlying theory for modelling

systems consisting of interacting components, and for supporting a formal analysis

of such models. This chapter introduces the building blocks of the language

which enable individual components to be described, and discusses how components

are combined into systems. Specification and verification through refinement,

and with respect to property-oriented specifications, is also covered. The chapter

finishes with a brief discussion of how discrete time can be modelled.

Chapter 2 shows how to use CSP to construct models of security protocols,

which consist of a number of communicating components and are thus well suited

to analysis in CSP. The variety of possible attacks on protocols must also be

built into the model, and the chapter shows how to incorporate the Dolev-Yao

approach to modelling a hostile environment and produce a system description

which is suitable for analysis.

Chapter 3 covers the kinds of properties that security protocols are expected

to provide, and how they can be expressed formally within the CSP framework.

Secrecy and authentication are the main concern of the approaches in this book,

and various forms are covered. The properties of non-repudiation and anonymity

are also discussed.

Chapter 4 introduces the model-checking tool support available for CSP, the

Failures-Divergences Refinement checker (FDR). It discusses how this tool works,

and the nature of refinement checking.

Chapter 5 is concerned with the Casper tool. This is a compiler for security

protocols, which transforms a high-level description of a security protocol,

and the properties required of it, into a CSP model of the protocol as described

in Chapter 2, and a number of assertions to be checked. This model can then

be analyzed using the model-checker FDR discussed in Chapter 4.

Chapter 6 discusses in more detail some of the CSP modelling that is carried

out by Casper, particularly how the hostile environment is modelled to allow

efficient analysis by the model-checker.

Chapter 7 is concerned with direct verification of CSP models of protocols.

It introduces the 'rank function' approach to proving protocols corrrect. This

allows proofs to b constructed that verify protocol descriptions of arbitrary

size against their requirements. The theorem-proving and bespoke tool support

available for this approach is also discussed.

Chapter 8 addresses the problem of scale. Real-world protocols are very large

and their analysis is difficult because of the volume of detail contained in

their description. This chapter is concerned with 'simplifying transformations',

which allow extraneous detail to be abstracted away when checking a protocol

against a particular property in such a way that verification of the abstract

protocol implies correctness of the full protocol. The approach is illustrated

with the CyberCash main sequence protocol.

Chapter 9 discusses the literature on security protocol verification and its

historical context. There are a number of different approaches to the problems

addressed in this book, and this chapter covers many of those that have been

most influential in the field.

Chapter 10 discusses the broader issues, open problems and areas of ongoing

research, and gives indications of areas for possible further developments and

research. One area of current research discussed in this chapter, of particular

importance to the model-checking approach of this book, is the development of

techniques based on 'data independence', which allow the results of model-checking

to be lifted to protocol models of arbitrary size.

There are three appendices. The first covers some background mathematics and

cryptography, introducing the RSA and the ElGamal schemes; the second is an

example of Casper applied to the Yahalom protocol, containing the input file

and the CSP model produced by Casper; and the third contains a verification

using rank functions of the simplified CyberCash protocol descriptions produced

in Chapter 8.

The book has an associated website: cs.rhbnc.ac.uk/books/secprot/This website

provides access to all of the tools discussed in this book, and to the protocol

examples that are used throughout (as well as others). Readers are recommended

to download the tools and experiment with protocol analysis while reading the

book. The website also provides exercises (and answers!), as well as a variety

of other related material.

Acknowledgements

The authors would like to thank DERA (the Defence and Evaluation Research

Agency, UK) and the MoD for funding the Strategic Research Project (SRP) 'Modelling

and Analysis of Security Protocols' under which the foundations of the approach

were laid down, and the EPRSC (UK Engineering and Physical Sciences Research

Council) and ONR (US Office of Naval Research) for funding subsequent developments

of the approach. Thanks are also due to Inmos, ONR, DERA and ESPRIT, for funding

developments to FDR over the years.

Peter Ryan would also like to thank the Department of Computer Science, Royal

Holloway, and Microsoft Research, Cambridge, for hospitality during the writing

of this book.

This work has benefited from collaboration with Philippa Broadfoot, Neil Evans,

James Heather, Mei Lin Hui, Ranko Lazi´ c and the staff at Formal Systems.

It has also been influenced by discussions with and comments from Giampaolo

Bella, Steve Brackin, Dieter Gollmann, Andy Gordon, Roberto Gorrieri, Joshua

Guttman, Richard Kemmerer, John McLean, Cathy Meadows, Larry Paulson, Matthias

Schunter, Paul Syverson and Paulo Verissimo.

Finally, special thanks are due to Coby, Helen and Liz, Kate and Eleanor for

moral support. 0201674718P04062001

From the Back Cover

Security protocols are one of the most critical elements in enabling the secure communication and processing of information, ensuring its confidentiality, integrity, authenticity and availability. These protocols are vulnerable to a host of subtle attacks, so designing protocols to be impervious to such attacks has proved to be extremely challenging and error prone.

This book provides a thorough and detailed understanding of one of the most effective approaches to the design and evaluation of security critical systems, describing the role of security protocols in distributed secure systems and the vulnerabilities to which they are prey.

The authors introduce security protocols, the role they play and the cryptographic mechanisms they employ, and detail their role in security architectures, e-commerce, e-cash etc. Precise characterizations of key concepts in information security, such as confidentiality, authentication and integrity are introduced and a range of tools and techniques are described which will ensure that a protocol guarantees certain security services under appropriate assumptions.

Modeling and Analysis of Security Protocols provides:

  • An in-depth discussion of the nature and role of security protocols and their vulnerabilities.
  • A rigorous framework in which security protocols and properties can be defined in detail.
  • An understanding of the tools and techniques used to design and evaluate security protocols.

"About this title" may belong to another edition of this title.

  • PublisherAddison-Wesley
  • Publication date2000
  • ISBN 10 0201674718
  • ISBN 13 9780201674712
  • BindingPaperback
  • Number of pages320

Buy Used

Condition: Good
Get fast and secure shipping knowing... Learn more about this copy

Shipping: US$ 3.30
Within U.S.A.

Destination, rates & speeds

Add to basket

Top Search Results from the AbeBooks Marketplace

Stock Image

Ryan, P. Y. A.; Schneider, S. A.; Goldsmith, M. H.; Lowe, G.; Roscoe, A. W.
Published by Addison-Wesley, 2000
ISBN 10: 0201674718 ISBN 13: 9780201674712
Used Softcover

Seller: Austin Goodwill 1101, Austin, TX, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: Good. Get fast and secure shipping knowing your purchase helps empower our community to transform their lives through work. Seller Inventory # 4RZURM000KX4

Contact seller

Buy Used

US$ 7.45
Convert currency
Shipping: US$ 3.30
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Roscoe, Bill
Published by Addison-Wesley, 2000
ISBN 10: 0201674718 ISBN 13: 9780201674712
Used Paperback

Seller: WorldofBooks, Goring-By-Sea, WS, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Paperback. Condition: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Seller Inventory # GOR001885178

Contact seller

Buy Used

US$ 5.42
Convert currency
Shipping: US$ 6.41
From United Kingdom to U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Ryan, P. Y. A.; Schneider, S. A.; Goldsmith, M. H.; Lowe, G.; Roscoe, A. W.
Published by Addison-Wesley, 2000
ISBN 10: 0201674718 ISBN 13: 9780201674712
Used Softcover

Seller: Books Unplugged, Amherst, NY, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: Good. Buy with confidence! Book is in good condition with minor wear to the pages, binding, and minor marks within 1.42. Seller Inventory # bk0201674718xvz189zvxgdd

Contact seller

Buy Used

US$ 17.69
Convert currency
Shipping: FREE
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Ryan, P. Y. A.
Published by Addison-Wesley Professional, 2023
ISBN 10: 0201674718 ISBN 13: 9780201674712
Used Softcover

Seller: Ergodebooks, Houston, TX, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Softcover. Condition: Good. (Pearson Education) A thorough and detailed explanation of the most common and effective approaches to the design and analysis of security critical systems. Describes the role of security protocols, exposing their strengths and weaknesses. Covers each different kind of protocol in detail, touching on key concepts such as confidentiality and integrity. Softcover. Seller Inventory # SONG0201674718

Contact seller

Buy Used

US$ 17.69
Convert currency
Shipping: FREE
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Schneider, Steve, Lowe, Gavin, Goldsmith, Michael, Roscoe, Bill, Ryan, Peter
Published by Pearson Education, Limited, 2000
ISBN 10: 0201674718 ISBN 13: 9780201674712
Used Softcover

Seller: Better World Books Ltd, Dunfermline, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: Very Good. Ships from the UK. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects. Seller Inventory # 2239057-20

Contact seller

Buy Used

US$ 8.08
Convert currency
Shipping: US$ 10.68
From United Kingdom to U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Ryan, P. Y. A.
Published by Addison-Wesley, 2000
ISBN 10: 0201674718 ISBN 13: 9780201674712
Used Paperback

Seller: GoldenDragon, Houston, TX, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Paperback. Condition: very good. Very Good Copy. Fast Shipment. Seller Inventory # SilverDragon0201674718

Contact seller

Buy Used

US$ 31.48
Convert currency
Shipping: US$ 3.25
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Ryan, P. Y. A.
Published by Addison-Wesley, 2000
ISBN 10: 0201674718 ISBN 13: 9780201674712
Used Paperback

Seller: GoldBooks, Denver, CO, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Paperback. Condition: very good. Very Good Copy. Customer Service Guaranteed. Seller Inventory # think_very_0201674718

Contact seller

Buy Used

US$ 30.53
Convert currency
Shipping: US$ 4.25
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Peter Ryan
Published by Addison Wesley, 2001
ISBN 10: 0201674718 ISBN 13: 9780201674712
Used Softcover

Seller: Ammareal, Morangis, France

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Softcover. Condition: Bon. Ancien livre de bibliothèque. Petite(s) trace(s) de pliure sur la couverture. Salissures sur la tranche. Pages cornées. Edition 2001. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Good. Former library book. Slightly creased cover. Stains on the edge. Dog-eared pages. Edition 2001. Ammareal gives back up to 15% of this item's net price to charity organizations. Seller Inventory # E-563-547

Contact seller

Buy Used

US$ 34.49
Convert currency
Shipping: US$ 8.89
From France to U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Ryan, P. Y. A.; Schneider, S. A.; Goldsmith, M. H.; Lowe, G.; Roscoe, A. W.
Published by Addison-Wesley, 2000
ISBN 10: 0201674718 ISBN 13: 9780201674712
New Paperback

Seller: GoldenWavesOfBooks, Fayetteville, TX, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Paperback. Condition: new. New. Fast Shipping and good customer service. Seller Inventory # Holz_New_0201674718

Contact seller

Buy New

US$ 99.17
Convert currency
Shipping: US$ 4.00
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Ryan, P. Y. A.
Published by Addison-Wesley, 2000
ISBN 10: 0201674718 ISBN 13: 9780201674712
New Paperback

Seller: GoldBooks, Denver, CO, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Paperback. Condition: new. New Copy. Customer Service Guaranteed. Seller Inventory # think0201674718

Contact seller

Buy New

US$ 102.35
Convert currency
Shipping: US$ 4.25
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket

There are 5 more copies of this book

View all search results for this book