Implementing Security Protocol Monitors
Abstract
Cryptographic protocols are often specified by narrations, i.e., finite sequences of message exchanges that show the intended execution of the protocol. Another use of narrations is to describe attacks. We propose in this paper to compile, when possible, attack describing narrations into a set of tests that honest participants can perform to exclude these executions. These tests can be implemented in monitors to protect existing implementations from rogue behaviour.
- Publication:
-
arXiv e-prints
- Pub Date:
- September 2021
- DOI:
- 10.48550/arXiv.2109.02802
- arXiv:
- arXiv:2109.02802
- Bibcode:
- 2021arXiv210902802C
- Keywords:
-
- Computer Science - Cryptography and Security
- E-Print:
- In Proceedings SCSS 2021, arXiv:2109.02501