Applying a formal analysis technique to the CCITT X.509 strong two-way authentication protocol
✍ Scribed by Klaus Gaarder; Einar Snekkenes
- Book ID
- 104659349
- Publisher
- Springer
- Year
- 1991
- Tongue
- English
- Weight
- 845 KB
- Volume
- 3
- Category
- Article
- ISSN
- 0933-2790
No coin nor oath required. For personal study only.
✦ Synopsis
In the quest for open systems, standardization of security mechanisms, framework, and protocols are becoming increasingly important. This puts high demands on the correctness of the standards. In this paper we use a formal logic-based approach to protocol analysis introduced by Burrows et al. [1]. We extend this logic to deal with protocols using public key cryptography, and with the notion of "duration" to capture some time-related aspects. The extended logic is used to analyse an important CCITT standard, the X.509 Authentication Framework. We conclude that protocol analysis can benefit from the use of the notation and that it highlights important aspects of the protocol analysed. Some aspects of the formalism need further study.