Complementing computational protocol analysis with formal specifications

6Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The computational proof model of Bellare and Rogaway for cryptographic protocol analysis is complemented by providing a formal specification of the actions of the adversary and the protocol entities. This allows a matching model to be used in both a machine-generated analysis and a human-generated computational proof. Using a protocol of Jakobsson and Pointcheval as a case study, it is demonstrated that flaws in the protocol could have been found with this approach, providing evidence that the combination of human and computer analysis can be more effective than either alone. As well as finding the known flaw, previously unknown flaws in the protocol are discovered by the automatic analysis. © 2005 by International Federation for Information Processing.

Cite

CITATION STYLE

APA

Choo, K. K. R., Boyd, C., Hitchcock, Y., & Maitland, G. (2005). Complementing computational protocol analysis with formal specifications. In IFIP Advances in Information and Communication Technology (Vol. 173, pp. 129–144). Springer New York LLC. https://doi.org/10.1007/0-387-24098-5_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free