Graphical Descriptions of Security Protocols
نویسندگان
چکیده
We present a graphical approach to security protocol representation. Protocol runs can be viewed as Message Sequence Charts. Message Sequence Charts are an appropriate graphical representation of security protocols. We show how sequence charts can be constructed from protocol runs of a broad range of processes in the Security Protocol Language (SPL). In their graphical form, Message Sequence Charts make the behaviour of a protocol easier to understand. They are particularly valuable when runs exhibit undesired behaviour, where they can give a concise account on how to attack protocol weaknesses. The relation between MSCs and SPL process runs is at the basis of the protocol visualization capabilities of the χ-Sim tool. The tool allows developers to simulate protocols programmed in an implementation of SPL. The resulting runs can be rendered graphically as MSCs.
منابع مشابه
Diagrammatic Verification of Security Protocols
The Actor Specification Diagram Language is a rigorously defined graphical specification language, with features for modelling concurrency and asynchronous communication. These features make the language appropriate for the formal analysis of distributed security protocols. The graphical nature of the language makes protocol descriptions easy to read and understand, vital properties for appeal ...
متن کاملPreferences, Descriptions, and Response Latency to Fractal Images Among Individuals With and Without Schizophrenia
Background: Early simple, low-cost diagnosis of schizophrenia may accelerate the beginning of the treatment process. Here, utilizing the projective tools, including fractal images, are some of the diagnostic aids. Objectives: This study aimed to compare the preferences, descriptions, and response latency to fractal images between schizophrenic and healthy individuals. Materials & Methods: In ...
متن کاملA Highly Secure Instant Messaging Protocol
Nowadays, Instant Messaging (or IM for short) is becoming one of the most popular applications on the Internet. Individuals can communicate instantly through a user-friendly graphical user interface over fixed and wireless devices. However, several security issues occur, majorly privacy and authentication. A number of secure IM protocols have been proposed, but they still lack of necessary secu...
متن کاملDesign of an Efficient Security Protocol Analyzer
In this paper, we present a efficient security protocol analyzer to verify cryptographic security protocols. Our analyzer verifies security protocols based on notions of provable security. The analyzer only checks whether the core properties of security protocols satisfy the notions, making it faster than previous tools. The analyzer automatically checks whether authentication and key distribut...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کامل