What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Speci cation in Formal Cryptographic Protocol Analysis
نویسنده
چکیده
Much attention has been paid to the design of languages for the speci cation of cryptographic protocols. However, the ability to specify their desired behavior correctly is also important; indeed many perceived protocol aws arise out of a misunderstanding of the protocol's requirements. In this talk we give a brief survey of the history of requirements speci cation in formal analysis of cryptographic protocols. We outline the main approaches and describe some of the open issues.
منابع مشابه
What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis
Much attention has been paid to the design of languages for the speci cation of cryptographic protocols. However, the ability to specify their desired behavior correctly is also important; indeed many perceived protocol aws arise out of a misunderstanding of the protocol's requirements. In this talk we give a brief survey of the history of requirements speci cation in formal analysis of cryptog...
متن کاملFormal Methods for the Analysis of Authentication Protocols
In this paper, we examine current approaches and the state of the art in the application of formal methods to the analysis of cryptographic protocols. We use Meadows' classi cation of analysis techniques into four types. The Type I approach models and veri es a protocol using speci cation languages and veri cation tools not speci cally developed for the analysis of cryptographic protocols. In t...
متن کاملFormal Methods for the Analysis of Authentication ProtocolsCITI
In this paper, we examine current approaches and the state of the art in the application of formal methods to the analysis of cryptographic protocols. We use Meadows' classi cation of analysis techniques into four types. The Type I approach models and veri es a protocol using speci cation languages and veri cation tools not speci cally developed for the analysis of cryptographic protocols. In t...
متن کاملThe Evolution of Requirements Speci cation inFormal
Much attention has been paid to the design of languages for the speciication of cryptographic protocols. However, the ability to specify their desired behavior correctly is also important; indeed many perceived protocol aws arise out of a misunderstanding of the proto-col's requirements. In this talk we give a brief survey of the history of requirements speciication in formal analysis of crypto...
متن کاملCAPSL Interface for the NRL Protocol Analyzer
The Common Authentication Protocol Speci cation Language (CAPSL) is a high-level language for applying formal methods to the security analysis of cryptographic protocols. Its goal is to permit a protocol to be speci ed once in a form that is usable as an interface to any type of analysis tool or technique, given appropriate translation software. This paper describes the rst operational CAPSL tr...
متن کامل