Formal Verification of Cryptographic Protocols
نویسنده
چکیده
منابع مشابه
A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملFormal representation and reasoning approaches in modelling cryptographic protocols
We survey at a very high level some examples of existing work involving the formal verification of the properties of cryptographic protocols. For the purposes of this survey, formal verification includes the use of logics, proof systems, and inductive reasoning. The goal of this survey is twofold. First, it reviews a few existing attempts found in the literature to model cryptographic protocols...
متن کاملFormal Verification of Cryptographic Protocols: A Survey
In this paper we give a survey of the state of the art in the application of formal methods to the analysis of cryptographic protocols. We attempt to outline some of the major threads of research in this area, and also to document some emerging trends. : : :
متن کاملOn formal and automatic security verification of WSN transport protocols
In this paper, we address the problem of formal and automated security verification ofWSN transport protocols that may perform cryptographic operations. The verification ofthis class of protocols is difficult because they typically consist of complex behavioral charac-teristics, such as real-time, probabilistic, and cryptographic operations. To solve this problem,we propose a pr...
متن کاملExtending CAPSL for Logic-Based Verifications
Cryptographic protocols are designed to provide security services, such as key distribution, authentication and non-repudiation, over insecure networks. The design process of cryptographic protocols is highly complex. In particular, the translation from the informal protocol description to the formal protocol specification is an error-prone step, as the exact meaning of the requirements of the ...
متن کاملReconciling Operational and Epistemic Approaches to the Formal Analysis of Crypto-Based Security Protocols
We propose a unifying framework for formal specification and verification of both epistemic and behavioral aspects of security protocols. The main novelty of the proposed framework is the explicit support for cryptographic constructs, which is among the most essential ingredients of security protocols. Due to this feature, the indistinguishability relation for the epistemic constructs gets a dy...
متن کامل