Test Suite development for verification of TLS security protocol
نویسندگان
چکیده
منابع مشابه
Verification of A Security Adaptive Protocol Suite Using SPIN
communication technologies in recent years introduced various adaptive protocols to adapt the need for secured communications. Security is a crucial success factor for any communication protocols, especially in mobile environment due to its ad hoc behavior. Formal verification plays an important role in development and application of safety critical systems. Formalized exhausted verification te...
متن کاملSuite B Profile for Transport Layer Security (TLS)
This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text...
متن کاملOn the Security of the TLS Protocol
In this research, the student will do a survey on TLS security, based on a recent paper by Krawczyk, Paterson, and Wee [KPW13]. Security is first shown for the most common mode of TLS, which is the TLS-RSA, under some security assumptions in the random oracle model. The security of other modes of TLS is then derived, and is shown to hold in the standard model.
متن کاملOptimization of TLS security protocol using the adaptable security model
Security protocols used in today’s communication are complex and it is very difficult to analyze and optimize them. Literature reports some results which optimize security protocols. In the case of devices with limited resources (mobile phones, PDA, sensors) the speed and efficiency of the process is crucial for their stable work. Security methods used during transporting the data between parti...
متن کاملAbstractions for Security Protocol Verification
ions for Security Protocol Verification Binh Thanh Nguyen and Christoph Sprenger Institute of Information Security, ETH Zurich, Switzerland {thannguy,sprenger}@inf.ethz.ch Abstract. We present a large class of security protocol abstractions with the aim of improving the scope and efficiency of verification tools. We propose typed abstractions, which transform a term’s structure based on its typ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of the Institute for System Programming of RAS
سال: 2012
ISSN: 2079-8156,2220-6426
DOI: 10.15514/ispras-2012-23-22