Complementing Computational Protocol Analysis with Formal Specifications

نویسندگان

  • Kim-Kwang Raymond Choo
  • Colin Boyd
  • Yvonne Hitchcock
  • Greg Maitland
چکیده

The computational proof model of Bellare and Rogaway for cryptographic protocol analysis is complemented by providing a formal specification of the actions of the adversary and the protocol entities. This allows a matching model to be used in both a machine-generated analysis and a human-generated computational proof. Using a protocol of Jakobsson and Pointcheval as a case study, it is demonstrated that flaws in the protocol could have been found with this approach, providing evidence that the combination of human and computer analysis can be more effective than either alone. As well as finding the known flaw, previously unknown flaws in the protocol are discovered by the automatic analysis.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

Semi-Automatic Implementation of Transport and Session Protocols

The paper describes experience with the use of formal protocol specifications in the protocol implementation process. As formal description techniques (FDT) for OSI protocols are being standardized, formal OSI protocol specifications in these FDT's become available on a trial basis. The technical issues involved in the use of such specifications for the automation of the implementation process ...

متن کامل

Formal Methods for Describing Distributed Systems: a Discussion of the Experience in Osi Standardization*

Distributed systems are difficult to design and implement because of concurrent activities in the different system components. The use of formal specifications for describing the behavior of these components facilitates the systematic analysis of the system and its implementation. So-called formal description techniques (FDT's) have been developed in recent years for the formal description of t...

متن کامل

Using Process Algebra to Design Better Protocols

Protocols are mainly specified in natural languages, such as English, without presenting a formal specification or some sort of pseudo code. At first glance this seems to be an advantage: everybody can easily read and understand the specification, and hence, the protocol is easy to implement. However, looking at contemporary protocol developments more closely, it turns out that natural language...

متن کامل

Modular specification and verification of XTP

The transfer protocol framework supports the formal specification and verification of data transfer protocols. It consists of generic specification modules and theorems. Compositions of specification module instances result in well-structured specifications which describe a protocol, the medium used, and the service provided by means of TLA formulas. The protocol verification is based on the pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004