Verifying authentication protocols with CSP
نویسنده
چکیده
This paper presents a general approach for analysis and veri cation of authentication properties in the language of Communicating Sequential Processes CSP It is il lustrated by an examination of the Needham Schroeder public key protocol The contribution of this paper is to develop a speci c theory appropriate to the analy sis of authentication protocols built on top of the gen eral CSP semantic framework This approach aims to combine the ability to express such protocols in a natu ral and precise way with the facility to reason formally about the properties they exhibit
منابع مشابه
Embedding CSP in PVS. An Application to Authentication Protocols
In [28], Schneider applies CSP to the modelling and analysis of authentication protocols and develops a general proof strategy for verifying authentication properties. This paper shows how the PVS theorem prover can provide e ective mechanical support to the approach.
متن کاملVerifying Authentication Protocols in CSP
This paper presents a general approach for analysis and verification of authentication properties using the theory of Communicating Sequential Processes (CSP). The paper aims to develop a specific theory appropriate to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach aims to combine the ability to express such protocols in a natural and...
متن کاملVerifying Authentication Protocol Implementations
Formal methods for verifying authentication protocols tend to assume an idealised perfect form of encryption This approach has been spec tacularly successful in nding aws but when we aim for proofs of cor rectness then we need to consider this assumption more carefully and perhaps to weaken it to re ect properties of real cryptographic mech anisms This paper reviews the existing CSP approach to...
متن کاملUsing Csp for Protocol Analysis: the Needham-schroeder Public-key Protocol
This paper presents a general approach for analysis and veriication of authentication properties in CSP. It is illustrated by an examination of the Needham-Schroeder Public-Key protocol. The paper aims to develop a speciic theory appropriate to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach aims to combine the ability to express such ...
متن کاملUsing Re nement to Analyse the Safety of anAuthentication
level of the initial service description. It was only by relating abstract and concretemachines that we could understand how the intruder behaviour manifests itself at the abstractlevel. Furthermore, we were not in a position to modify the intruder behaviour in order to avoidmodifying the abstract speci cation.Our Needham-Schroeder development was partly analysed using a commerc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1997