Abstract
This note introduces my extensions to Paulson’s “Inductive Approach” in order to reason about agents’ knowledge. First, I argue that an agent knows all the components of those messages she creates. I exploit this notion on some crypto-protocols with particular message structure. Then, I allow a new event, message reception, to occur on the network. This leads to a broad definition of agents’ knowledge, which extends the existing definition of spy’s knowledge. I will discuss strengths and weaknesses of the two models when proving session key knowledge.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abadi, M., Burrows, M., Kaufman, C., Lampson, B.: Authentication and Delegation with Smart-cards. DIGITAL Technical Report 67, California (1990)
Bella, G.: Enhancing the Inductive Approach by Message Reception. Technical Report No. 460, Cambridge University, Computer Laboratory (1999)
Bella, G.: Are Timestamps Worth the Effort? A Formal Treatment. Technical Report No. 427, Cambridge University, Computer Laboratory (1998)
Bella, G., Paulson, L.C.: Kerberos Version IV: Inductive Analysis of the Secrecy Goals. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 361–375. Springer, Heidelberg (1998)
Lowe, G.: A Hierarchy of Authentication Specifications. In: Proc. of Tenth IEEE Computer Security Foundations Workshop (1997)
Paulson, L.C.: The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security 6, 85–128 (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bella, G. (2000). Modelling Agents’ Knowledge Inductively. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 1999. Lecture Notes in Computer Science, vol 1796. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10720107_12
Download citation
DOI: https://doi.org/10.1007/10720107_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67381-1
Online ISBN: 978-3-540-45570-7
eBook Packages: Springer Book Archive