06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

B.2 Attestation Protocol<br />

dened in this section are not instantiated with actual value. The instantiation is done in<br />

the system denition of a Casper script.<br />

Processes: Each agent in the system is represented by a CSP process, which is dened<br />

in the #Processes of a Casper script.<br />

Specications: The security requirements against which the protocol is analysed by the<br />

FDR tool are dened in the #Specification section of a Casper script.<br />

B.1.2<br />

System Denition<br />

The system denition describes the actual system that is required to be analysed as part of<br />

the protocol analysis by the FDR tool. The system denition contains four sub-components<br />

that are discussed below:<br />

Type Denition: The variable types that are going to be used in the actual systems are<br />

instantiated in the #Actual variables section of a Casper script. The variables dened<br />

in the #Free variables are instantiated in this section, and the FDR tool will use these<br />

variables during the analysis.<br />

Functions: Any functions dened in the #Free variables have to be dened under the<br />

#Functions heading in a Casper script.<br />

System Denition: The agents that would be present during the execution of the protocol<br />

as part of the FDR analysis are dened under the heading System in a Casper script.<br />

The denition of the agents in this section corresponds to the denition of agents under<br />

the heading Processes of a Casper script.<br />

Intruder: Finally, in the #Intruder In<strong>for</strong>mation section of a Casper script we dene the<br />

identity and capability of an intruder in the system againist which the security requirements<br />

stipulated in #Specification are evaluated by the FDR tool.<br />

B.2 Attestation Protocol<br />

The Casper script in this section corresponds to the attestation protocol described in<br />

section 4.7.<br />

#Free variables<br />

SC, CM : Agent<br />

ns, nsp, nt, challenge, response : Nonce<br />

SID1, SID2 : Num<br />

VKey: Agent -> PublicKey<br />

SKey: Agent -> SecretKey<br />

InverseKeys = (sKey, sKey), (VKey, SKey)<br />

#Protocol description<br />

0. -> SC : CM<br />

1. SC -> CM : SID1,{SC, ns, CM,}{sKey}<br />

2. CM -> SC : {CM, ns, nm, challenge, SID2}{sKey}<br />

242

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!