Data independent verification of crypto-protocols
โ Scribed by A.W. Roscoe; Philippa Broadfoot; Gavin Lowe
- Publisher
- Elsevier Science
- Year
- 2001
- Tongue
- English
- Weight
- 29 KB
- Volume
- 40
- Category
- Article
- ISSN
- 1571-0661
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
We propose a method of formally analysing security protocols based on rewriting. The method is roughly as follows. A security protocol is modeled as an observational transition system, which is described in CafeOBJ. Proof scores showing that the protocol has safety (security) properties are then wri
We present CASRUL, a compiler for cryptographic protocols specifications. Its purpose is to verify the executability of protocols and to translate them into rewrite rules that can be used by several kinds of automatic or semi-automatic tools for finding design flaws. We also present a related comple
In this paper, we describe a method to formally verify activity-based specifications such as EBSDL. Starting from EBSDL-like specifications that specify engineering activities in terms of input and output behaviors, we derive programs in an asynchronous language CSP-R. CSP-R programs are then verifi