𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Applying a formal analysis technique to the CCITT X.509 strong two-way authentication protocol

✍ Scribed by Klaus Gaarder; Einar Snekkenes


Book ID
104659349
Publisher
Springer
Year
1991
Tongue
English
Weight
845 KB
Volume
3
Category
Article
ISSN
0933-2790

No coin nor oath required. For personal study only.

✦ Synopsis


In the quest for open systems, standardization of security mechanisms, framework, and protocols are becoming increasingly important. This puts high demands on the correctness of the standards. In this paper we use a formal logic-based approach to protocol analysis introduced by Burrows et al. [1]. We extend this logic to deal with protocols using public key cryptography, and with the notion of "duration" to capture some time-related aspects. The extended logic is used to analyse an important CCITT standard, the X.509 Authentication Framework. We conclude that protocol analysis can benefit from the use of the notation and that it highlights important aspects of the protocol analysed. Some aspects of the formalism need further study.