11.07.2015 Views

Security Protocols I - Information Security

Security Protocols I - Information Security

Security Protocols I - Information Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Sebastian Mödersheim 57Prudent engineering of security protocols• Principles proposed by Abadi and Needham (1994, 1995):◮ Every message should say what it means.◮ Specify clearly conditions for a message to be acted on.◮ Mention names explicitly if they are essential to the meaning.◮ Be clear as to why encryption is being done: confidentiality,message authentication, binding of messages, ...e.g. {X, Y } inv(K) versus {X} inv(K) , {Y } inv(K)◮ Be clear on what properties you are assuming.◮ Beware of clock variations (for timestamps).◮ etc.• Good advice, but◮ Is the protocol guaranteed to be secure then?◮ Is it optimal and/or minimal then?◮ Have you considered all types of attacks?◮ etc.FMSEC Module 2, v.2 28.09.2009

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!