Repository logo
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Scholalry Output
  3. Publications
  4. A Tutorial-Style Introduction to DY⋆
 
  • Details

A Tutorial-Style Introduction to DY⋆

Source
Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
ISSN
03029743
Date Issued
2021-01-01
Author(s)
Bhargavan, Karthikeyan
Bichhawat, Abhishek  
Do, Quoc Huy
Hosseyni, Pedram
Küsters, Ralf
Schmitz, Guido
Würtele, Tim
DOI
10.1007/978-3-030-91631-2_4
Volume
13066 LNCS
Abstract
DY<sup>⋆</sup> is a recently proposed formal verification framework for the symbolic security analysis of cryptographic protocol code written in the F<sup>⋆</sup> programming language. Unlike automated symbolic provers, DY<sup>⋆</sup> accounts for advanced protocol features like unbounded loops and mutable recursive data structures as well as low-level implementation details like protocol state machines and message formats, which are often at the root of real-world attacks. Protocols modeled in DY<sup>⋆</sup> can be executed, and hence, tested, and they can even interoperate with real-world counterparts. DY<sup>⋆</sup> extends a long line of research on using dependent type systems but takes a fundamentally new approach by explicitly modeling the global trace-based semantics within the framework, hence bridging the gap between trace-based and type-based protocol analyses. With this, one can uniformly, precisely, and soundly model, for the first time using dependent types, long-lived mutable protocol state, equational theories, fine-grained dynamic corruption, and trace-based security properties like forward secrecy and post-compromise security. In this paper, we provide a tutorial-style introduction to DY<sup>⋆</sup> : We illustrate how to model and prove the security of the ISO-DH protocol, a simple key exchange protocol based on Diffie-Hellman.
Unpaywall
URI
https://d8.irins.org/handle/IITG2025/25649
Subjects
Cryptographic protocols | F⋆ | Formal methods | Mechanized proofs | Protocol analysis
IITGN Knowledge Repository Developed and Managed by Library

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science

  • Privacy policy
  • End User Agreement
  • Send Feedback
Repository logo COAR Notify