Browse by author
Lookup NU author(s): Dr Paul Robinson, Dr Nick Cook, Emeritus Professor Santosh Shrivastava
The correct implementation of security protocols is a challenging task. Like any software, to gain high confidence in a given implementation, ideally one requires both: (i) a formal specification that has been subjected to verification; and (ii) tool support to generate an implementation from the verified specification. The former area has attracted considerable attention for security protocols, and significant advances have been made. In the latter area, the state of the art has not progressed beyond simple security protocols with a small number of steps. This paper presents an improved approach to protocol implementation. Starting with a formal protocol specification, a rigorous process with considerable tool support leads to the deployment of implementations in a flexible middleware framework for their execution. To illustrate the approach, the paper describes the implementation of a deterministic, fair non-repudiation protocol. Such protocols are quite complex, as they require both sub-protocols and trusted third party involvement in order to guarantee fairness. Therefore, it is reasonable to assume that we can extend the approach to a wide range of less complex, deterministic
Author(s): Robinson P, Cook NO, Shrivastava SK
Publication type: Report
Publication status: Published
Series Title: School of Computing Science Technical Report Series
Year: 2005
Pages: 19
Print publication date: 01/12/2005
Source Publication Date: December 2005
Report Number: 937
Institution: School of Computing Science, University of Newcastle upon Tyne
Place Published: Newcastle upon Tyne
URL: http://www.cs.ncl.ac.uk/publications/trs/papers/937.pdf