Formal Support for Standardizing Protocols with State
نویسندگان
چکیده
Many cryptographic protocols are designed to achieve their goals using only messages passed over an open network. Numerous tools, based on well-understood foundations, exist for the design and analysis of protocols that rely purely on message passing. However, these tools encounter difficulties when faced with protocols that rely on non-local, mutable state to coordinate several local sessions. We adapt one of these tools, cpsa, to provide automated support for reasoning about state. We use Ryan’s Envelope Protocol as an example to demonstrate how the message-passing reasoning can be integrated with state reasoning to yield interesting and powerful results.
منابع مشابه
A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملInvestigation of the Role of Collaboration Network Between State and Formal Public Institutions in Implementation of Watershed Management Projects and Soil Erosion Decrease Case Study: Berentin-Hormozgan Province
In spite of successfulness of watershed management project, this science could not be able to combat soil erosion lonely and it needs the participation of habitants of watersheds that their livelihood completely depends on sustainable resources. So, this research through analysis of collaboration network between state and formal public institutions in implementation of mechanical and biological...
متن کاملMulti-channel Medium Access Control Protocols for Wireless Sensor Networks: A Survey
Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...
متن کاملMulti-channel Medium Access Control Protocols for Wireless Sensor Networks: A Survey
Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...
متن کاملClassi cation of Dependable Real-time Protocols : A Formal-Methods Perspective for Validation
Computers used for critical applications utilize dependable and real-time protocols to deliver reliable and timely services. The inherently large state-space covered by these protocols limits the e ectiveness of the conventional veri cation and validation (V&V) techniques. A commonly used validation technique is that of fault injection (FI). Although a wide variety of techniques and tools exist...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015