Abstract
We develop a family of key agreement protocols that are correct by
construction. Our work substantially extends prior work on developing
security protocols by refinement. First, we strengthen the adversary
by allowing him to compromise different resources of protocol
participants, such as their long-term keys or their session keys. This
enables the systematic development of protocols that ensure strong
properties such as perfect forward secrecy. Second, we broaden the
class of protocols supported to include those with non-atomic keys and
equationally defined cryptographic operators. We use these extensions
to develop key agreement protocols including signed Diffie-Hellman and
the core of IKEv1 and SKEME.
License
Topics
Session Key_Agreement_Strong_Adversaries
- Infra
- Refinement
- Messages
- Message_derivation
- IK
- Secrecy
- AuthenticationN
- AuthenticationI
- Runs
- Channels
- Payloads
- Implem
- Implem_lemmas
- Implem_symmetric
- Implem_asymmetric
- pfslvl1
- pfslvl2
- pfslvl3
- pfslvl3_asymmetric
- pfslvl3_symmetric
- dhlvl1
- dhlvl2
- dhlvl3
- dhlvl3_asymmetric
- dhlvl3_symmetric
- sklvl1
- sklvl2
- sklvl3
- sklvl3_asymmetric
- sklvl3_symmetric