The computational proof model of Bellare and Rogaway for cryptographic protocol analysis is complemented by providing a formal specification of the actions of the adversary and the protocol entities. This allows a matching model to be used in both a machine-generated analysis and a human-generated computational proof. Using a protocol of Jakobsson and Pointcheval as a case study, it is demonstrated that flaws in the protocol could have been found with this approach, providing evidence that the combination of human and computer analysis can be more effective than either alone. As well as finding the known flaw, previously unknown flaws in the protocol are discovered by the automatic analysis. © 2005 by International Federation for Information Processing.
CITATION STYLE
Choo, K. K. R., Boyd, C., Hitchcock, Y., & Maitland, G. (2005). Complementing computational protocol analysis with formal specifications. In IFIP Advances in Information and Communication Technology (Vol. 173, pp. 129–144). Springer New York LLC. https://doi.org/10.1007/0-387-24098-5_10
Mendeley helps you to discover research relevant for your work.