TY - JOUR
T1 - Logical relations for encryption
AU - Sumii, Eijiro
AU - Pierce, Benjamin C.
PY - 2003
Y1 - 2003
N2 - The theory of relational parametricity and its logical relations proof technique are powerful tools for reasoning about information hiding in the polymorphic λ-calculus. We investigate the application of these tools in the security domain by defining a cryptographic λ-calculus - an extension of the standard simply typed λ-calculus with primitives for encryption, decryption, and key generation - and introducing syntactic logical relations (in the style of Pitts and Birkedal-Harper) for this calculus that can be used to prove behavioral equivalences between programs that use encryption. We illustrate the framework by encoding some simple security protocols, including the Needham-Schroeder public-key protocol. We give a natural account of the well-known attack on the original protocol and a straightforward proof that the improved variant of the protocol is secure.
AB - The theory of relational parametricity and its logical relations proof technique are powerful tools for reasoning about information hiding in the polymorphic λ-calculus. We investigate the application of these tools in the security domain by defining a cryptographic λ-calculus - an extension of the standard simply typed λ-calculus with primitives for encryption, decryption, and key generation - and introducing syntactic logical relations (in the style of Pitts and Birkedal-Harper) for this calculus that can be used to prove behavioral equivalences between programs that use encryption. We illustrate the framework by encoding some simple security protocols, including the Needham-Schroeder public-key protocol. We give a natural account of the well-known attack on the original protocol and a straightforward proof that the improved variant of the protocol is secure.
UR - http://www.scopus.com/inward/record.url?scp=0141751786&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=0141751786&partnerID=8YFLogxK
U2 - 10.3233/JCS-2003-11403
DO - 10.3233/JCS-2003-11403
M3 - Article
AN - SCOPUS:0141751786
SN - 0926-227X
VL - 11
SP - 521
EP - 554
JO - Journal of Computer Security
JF - Journal of Computer Security
IS - 4
ER -