Static validation of security protocols

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Static validation of security protocols

We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as N...

متن کامل

A note on the security of two improved RFID protocols

Recently, Baghery et al. [1, 2] presented some attacks on two RFID protocols, namely Yoon and Jung et al. protocols, and proposed the improved version of them. However, in this note, we show that the improved version of the Jung et al. protocol suffers from desynchronization attack and the improved version of the Yoon's protocol suffers from secret disclosure attack. The succe...

متن کامل

Security Protocols

In this paper, we show how a novel tool for analyzing classical cryptographic protocols can be used to model and analyze the more complex Internet security protocol families. We discuss the modifications that were necessary in the tool and how the tool illuminates flaws in the Transport Layer Security (TLS) protocol. We also show how a flaw carried over to TLS from the Secure Sockets Layer prot...

متن کامل

Static Analyses of Cryptographic Protocols

of “Static Analyses of Cryptographic Protocols” by Jay McCarthy, Ph.D., Brown University, May 2009 Most protocol analyses only address security properties. However, other properties are important and can increase our understanding of protocols, as well as aid in the deployment and compilation of implementations. We investigate such analyses. Unfortunately, existing high-level protocol implement...

متن کامل

Security Protocols

1 Theory of Agents and Messages for Security Protocols 13 1.0.1 Inductive Definition of All Parts” of a Message . . . . . . 14 1.0.2 Inverse of keys . . . . . . . . . . . . . . . . . . . . . . . . 14 1.1 keysFor operator . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 1.2 Inductive relation ”parts” . . . . . . . . . . . . . . . . . . . . . . 15 1.2.1 Unions . . . . . . . . . . . . . . ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computer Security

سال: 2005

ISSN: 1875-8924,0926-227X

DOI: 10.3233/jcs-2005-13302