a model for specification of cryptographic protocols and its operational interpretation with algebraic methods

Authors

said jalili

behruz - tork ladani

abstract

logic analysis and attack construction methods are two major approaches in verification of cryptographic protocols. however, it is almost preferable to use both of them for a complete analysis. in this paper, a generic framework for the integration of the two verification approaches is presented. using the framework we can propose analysis methods in which security properties and breach scenarios of the properties in a protocol can be verified in a unified manner. the focus on this paper is on a computational model of the protocols as the major component of the framework. the operational interpretation of the computational model with a term rewriting system (trs) is presented too. to specify an intended protocol, we can represent it as a set of individual steps, and then using a transformation algorithm, a terminated and confluent trs is generated automatically. this trs is used to construct a special representation of the protocol named the protocol execution path, which can be used as the base of various verification schemes. specification and verification of a sample protocol is presented too.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

designing and validating a textbook evaluation questionnaire for reading comprehension ii and exploring its relationship with achievement

در هر برنامه آموزشی، مهم ترین فاکتور موثر بر موفقیت دانش آموزان کتاب درسی است (مک دونو و شاو 2003). در حقیقت ، کتاب قلب آموزش زبان انگلیسی است( شلدن 1988). به دلیل اهمیت والای کتاب به عنوان عنصر ضروری کلاس های آموزش زبان ، کتب باید به دقت ارزیابی و انتخاب شده تا از هرگونه تاثیر منفی بر دانش آموزان جلوگیری شود( لیتز). این تحقیق با طراحی پرسش نامه ارزیابی کتاب که فرصت ارزیابی معتبر را به اساتید د...

15 صفحه اول

validation of a revised logical-mathematical intelligence scale and exploring its relationship with english language proficiency

نظریه هوش چندگانه قسمتهای متفاوت هوش بشری را مورد بررسی قرار می دهد که با شناخت آن شخص به درک بهتری از توانایی های خود میرسد و در نتیجه سعی در استفاده از آن جهت یادگیری بهتر میکند. همچنین با شناخت استعداد دانش آموزان، فرایند یادگیری بهتر میشود. هدف از انجام دادن این تحقیق بررسی رابطه بین هوش ریاضی و استعداد یادگیری زبان انگلیسی میباشد. برای انجام این تحقیق از پرسشنامه هوش ریاضی که توسط شیرر در ...

the innovation of a statistical model to estimate dependable rainfall (dr) and develop it for determination and classification of drought and wet years of iran

آب حاصل از بارش منبع تأمین نیازهای بی شمار جانداران به ویژه انسان است و هرگونه کاهش در کم و کیف آن مستقیماً حیات موجودات زنده را تحت تأثیر منفی قرار می دهد. نوسان سال به سال بارش از ویژگی های اساسی و بسیار مهم بارش های سالانه ایران محسوب می شود که آثار زیان بار آن در تمام عرصه های اقتصادی، اجتماعی و حتی سیاسی- امنیتی به نحوی منعکس می شود. چون میزان آب ناشی از بارش یکی از مولفه های اصلی برنامه ...

15 صفحه اول

Weak Algebraic Hyperstructures as a Model for Interpretation of Chemical Reactions

The concept of weak algebraic hyperstructures or Hv-structures constitutes a generalization of the well-known algebraic hyperstructures (semihypergroup, hypergroup and so on). The overall aim of this paper is to present an introduction to some of the results, methods and ideas about chemical examples of weak algebraic hyperstructures. In this paper after an introduction of basic definitions and...

full text

Language, Semantics, and Methods for Cryptographic Protocols

In this report we present a process language for security protocols together with an operational semantics and an alternative semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. This Petri-net semantics has a strong relation to both Paulson’s inductive set o...

full text

Process Algebraic Analysis of Cryptographic Protocols

Recent approaches to the analysis of crypto-protocols build on concepts which are well-established in the eld of process algebras, such as labelled transition systems (lts) and observational semantics. We outline some recent work in this direction that stems from using cryptographic versions of the pi-calculus { most notably Abadi and Gordon's spi-calculus { as protocol description languages. W...

full text

My Resources

Save resource for easier access later


Journal title:
the modares journal of electrical engineering

Publisher: tarbiat modares university

ISSN 2228-527 X

volume 3

issue 1 2003

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023