Applying Formal Methods to the Analysis of a Key Management Protocol
نویسنده
چکیده
In this paper we develop methods for analyzing key management and authentication protocols using techniques developed for the solutions of equations in a term rewriting system. In particular, we describe a model of a class of protocols and possible attacks on those protocols as term rewriting systems, and we also describe a software tool based on a narrowing algorithm that can be used in the analysis of such protocols. We formally model a protocol and describe the results of using these techniques to analyze security properties. We show how a security aw was found, and we also describe the veri cation of a corrected scheme using these techniques.
منابع مشابه
An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks
An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...
متن کاملDevelopment of a Google Earth Image's Visual Interpretation Protocol to Determine Plant Ecological Units of the Semi-Steppe Regions
Extended Abstract Background and objectives: Google Earth images are a valuable resource for understanding and studying the natural area's ecology due to their high spatial resolution. Considering that these images have been available for many years, in our country, these valuable data have not been used enough, especially in order to study vegetation and optimal natural areas management. So, ...
متن کاملارتقای عملکرد سازمانی از طریق فراموشی سازمانی هدفمند:مطالعه موردی
Introduction : Recently, companies have acknowledged organizational forgetting as a tool for optimizing organizational performance. The purpose of this research was to investigate the relationships among intentional organizational forgetting, organizational learning, knowledge management capability and organizational performance. Methods : In this survey, data collection was done by means o...
متن کاملThe Nessesity and Quality of Management Education in MD Program in Iran: A Qualitative Study
Introduction: Leadership and management skills are intrinsic to medical care, but low attention has been paid to them in educational curriculum for general practitioners in many countries including Iran. This study, based on Kern’s curriculum planning cycle, has investigated key informants` experiences and point of views about necessity and quality of management education in order to develop ma...
متن کاملFormal Analysis of Information Card Federated Identity - Management Protocol ∗
Information Card (InfoCard) is a usercentric identity management metasystem. It has been accepted as a standard of OASIS Identity Metasystem Interoperability Technical Committee. However, there is currently a lack of security analysis to InfoCard protocol, especially, with formal methods. In this paper, we accommodate such a requirement by analyzing security properties of InfoCard protocol adop...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Journal of Computer Security
دوره 1 شماره
صفحات -
تاریخ انتشار 1992