Based on our previous work on truly concurrent process algebras APTC, we use it to verify the security protocols. This work (called Secure APTC, abbreviated SAPTC) have the following advantages in verifying security protocols: (1) It has a firmly theoretic foundations, including equational logics, structured operational semantics, and axiomatizations between them; (2) It has rich expressive powers to describe security protocols. Cryptographic operations are modeled as atomic actions and can be extended, explicit parallelism and communication mechanism to modeling communication operations and principals, rich computational properties to describing computational logics in the security protocols, including conditional guards, alternative composition, sequential composition, parallelism and communication, encapsulation and deadlock, recursion, abstraction. (3) Especially by abstraction, it is convenient and obvious to observe the relations between the inputs and outputs of a security protocols, including the relations without any attack, the relations under each known attack, and the relations under unknown attacks if the unknown attacks can be described.
翻译:根据我们以前关于真正同时的流程代数APTC的工作,我们利用它来核查安全协议,这项工作(称为安全APTC,缩略的SAPTC)在核查安全协议方面有以下优势:(1) 具有牢固的理论基础,包括等式逻辑、结构化的操作语义和它们之间的分解;(2) 具有丰富的表达能力来描述安全协议; 密码操作以原子行动为模式,可以扩展为模拟通信业务和主机的、明确的平行和通信机制; 在描述安全协议中的计算逻辑方面具有丰富的计算特性,包括有条件的警卫、替代组成、顺序构成、平行和通信、封装和僵局、循环、抽象。 (3) 特别是抽象地观察安全协议的投入和产出之间的关系,包括无任何攻击的关系、每起已知攻击下的关系,以及如果可以描述未知的攻击,那么观察未知的攻击下的关系是方便和明显的。