Probabilistic model checking of security protocols without perfect cryptography assumption

12Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper presents the description of a new, probabilistic approach to model checking of security protocols. The protocol, beyond traditional verification, goes through a phase in which we resign from a perfect cryptography assumption. We assume a certain minimal, but measurable probability of breaking/gaining the cryptographic key, and explore how it affects the execution of the protocol. As part of this work we have implemented a tool, that helps to analyze the probability of interception of sensitive information by the Intruder, depending on the preset parameters (number of communication participants, keys, nonces, the probability of breaking a cipher, etc.). Due to the huge size of the constructed computational spaces, we use parallel computing to search for states that contain the considered properties.

References Powered by Scopus

On the Security of Public Key Protocols

4259Citations
N/AReaders
Get full text

Using Encryption for Authentication in Large Networks of Computers

1533Citations
N/AReaders
Get full text

The AVISPA tool for the automated validation of internet security protocols and applications

1035Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Security protocols analysis including various time parameters

19Citations
N/AReaders
Get full text

Mobile agent path planning under uncertain environment using reinforcement learning and probabilistic model checking

13Citations
N/AReaders
Get full text

A fast method for security protocols verification

9Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Siedlecka-Lamch, O., Kurkowski, M., & Piatkowski, J. (2016). Probabilistic model checking of security protocols without perfect cryptography assumption. In Communications in Computer and Information Science (Vol. 608, pp. 107–117). Springer Verlag. https://doi.org/10.1007/978-3-319-39207-3_10

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 1

100%

Readers' Discipline

Tooltip

Computer Science 1

100%

Save time finding and organizing research with Mendeley

Sign up for free