a model for specification of cryptographic protocols and its operational interpretation with algebraic methods
Authors
abstract
logic analysis and attack construction methods are two major approaches in verification of cryptographic protocols. however, it is almost preferable to use both of them for a complete analysis. in this paper, a generic framework for the integration of the two verification approaches is presented. using the framework we can propose analysis methods in which security properties and breach scenarios of the properties in a protocol can be verified in a unified manner. the focus on this paper is on a computational model of the protocols as the major component of the framework. the operational interpretation of the computational model with a term rewriting system (trs) is presented too. to specify an intended protocol, we can represent it as a set of individual steps, and then using a transformation algorithm, a terminated and confluent trs is generated automatically. this trs is used to construct a special representation of the protocol named the protocol execution path, which can be used as the base of various verification schemes. specification and verification of a sample protocol is presented too.
similar resources
designing and validating a textbook evaluation questionnaire for reading comprehension ii and exploring its relationship with achievement
در هر برنامه آموزشی، مهم ترین فاکتور موثر بر موفقیت دانش آموزان کتاب درسی است (مک دونو و شاو 2003). در حقیقت ، کتاب قلب آموزش زبان انگلیسی است( شلدن 1988). به دلیل اهمیت والای کتاب به عنوان عنصر ضروری کلاس های آموزش زبان ، کتب باید به دقت ارزیابی و انتخاب شده تا از هرگونه تاثیر منفی بر دانش آموزان جلوگیری شود( لیتز). این تحقیق با طراحی پرسش نامه ارزیابی کتاب که فرصت ارزیابی معتبر را به اساتید د...
15 صفحه اولvalidation of a revised logical-mathematical intelligence scale and exploring its relationship with english language proficiency
نظریه هوش چندگانه قسمتهای متفاوت هوش بشری را مورد بررسی قرار می دهد که با شناخت آن شخص به درک بهتری از توانایی های خود میرسد و در نتیجه سعی در استفاده از آن جهت یادگیری بهتر میکند. همچنین با شناخت استعداد دانش آموزان، فرایند یادگیری بهتر میشود. هدف از انجام دادن این تحقیق بررسی رابطه بین هوش ریاضی و استعداد یادگیری زبان انگلیسی میباشد. برای انجام این تحقیق از پرسشنامه هوش ریاضی که توسط شیرر در ...
the innovation of a statistical model to estimate dependable rainfall (dr) and develop it for determination and classification of drought and wet years of iran
آب حاصل از بارش منبع تأمین نیازهای بی شمار جانداران به ویژه انسان است و هرگونه کاهش در کم و کیف آن مستقیماً حیات موجودات زنده را تحت تأثیر منفی قرار می دهد. نوسان سال به سال بارش از ویژگی های اساسی و بسیار مهم بارش های سالانه ایران محسوب می شود که آثار زیان بار آن در تمام عرصه های اقتصادی، اجتماعی و حتی سیاسی- امنیتی به نحوی منعکس می شود. چون میزان آب ناشی از بارش یکی از مولفه های اصلی برنامه ...
15 صفحه اولWeak Algebraic Hyperstructures as a Model for Interpretation of Chemical Reactions
The concept of weak algebraic hyperstructures or Hv-structures constitutes a generalization of the well-known algebraic hyperstructures (semihypergroup, hypergroup and so on). The overall aim of this paper is to present an introduction to some of the results, methods and ideas about chemical examples of weak algebraic hyperstructures. In this paper after an introduction of basic definitions and...
full textLanguage, Semantics, and Methods for Cryptographic Protocols
In this report we present a process language for security protocols together with an operational semantics and an alternative semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. This Petri-net semantics has a strong relation to both Paulson’s inductive set o...
full textProcess Algebraic Analysis of Cryptographic Protocols
Recent approaches to the analysis of crypto-protocols build on concepts which are well-established in the eld of process algebras, such as labelled transition systems (lts) and observational semantics. We outline some recent work in this direction that stems from using cryptographic versions of the pi-calculus { most notably Abadi and Gordon's spi-calculus { as protocol description languages. W...
full textMy Resources
Save resource for easier access later
Journal title:
the modares journal of electrical engineeringPublisher: tarbiat modares university
ISSN 2228-527 X
volume 3
issue 1 2003
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023