next up previous
Next: General Framework and Requirements Up: A First Step towards Previous: A First Step towards

 

Introduction

The exponential growth of the Internet and electronic commerce brings not only prosperity, but also vulnerability. Numerous attacks pose a real challenge to different aspects of security mechanisms. Among these security mechanisms, security protocols play an essential role. They use cryptographic primitives as building blocks to achieve security goals such as authentication, confidentiality, and integrity. New applications and systems eagerly demand security protocols suitable to their system requirements. Unfortunately, designing security protocols is a delicate task and experience shows that security protocols are notoriously hard to get right [BAN89, Low96]. This naturally raises the question whether the current security protocol design process is satisfactory. If the answer is no, how can we improve it?

The current process of finding a solution is usually ad-hoc and involves little formalism, and almost no mechanical assistance. Such a design process is not satisfactory for the following reasons:

In this paper, we present automatic protocol generation, APG for short, a mechanism which addresses these shortcomings. With automatic protocol generation, the protocol designer specifies the desired security properties, such as authentication and secrecy, and system requirements, i.e., symmetric or asymmetric encryption/decryption, low bandwidth. A protocol generator then generates candidate security protocols which satisfy the system requirements. In the final step, a protocol screener analyzes the candidate protocols, discards the flawed protocols, and outputs the correct protocols that satisfy the desired security properties.

Our approach provides several advantages:

The remainder of this paper is organized as follows. We begin with an overview of the general framework and requirements of APG. Next, we present a case study of automatic generation of authentication protocols. In our case study, we show how we deal with the arising difficulties to make APG feasible. Following the case study, we discuss some of the limitations of APG, as well as the insights and results of the case study and the interesting directions for further research. Finally, we summarize the contributions of this paper.


next up previous
Next: General Framework and Requirements Up: A First Step towards Previous: A First Step towards

Adrian Perrig
Fri Sep 1 21:14:38 PDT 2000