DocumentCode :
1691028
Title :
What is the best way to prove a cryptographic protocol correct?
Author :
Malladi, Sreekanth ; Hura, Gurdeep S.
Author_Institution :
Coll. of Bus. & Inf. Syst., Dakota State Univ., Madison, SD
fYear :
2008
Firstpage :
1
Lastpage :
7
Abstract :
In this paper, we identify that protocol verification using invariants have significant limitations such as inapplicability to some protocols, non-standard attacker inferences and non-free term algebras. We argue that constraint solving for bounded process analysis can be used in conjunction with decidability of context-explicit protocols as a verification tool and can overcome those limitations. However, this is possible only when new decidability results are obtained for protocol security, especially in presence of non-standard inferences and non-free term algebras.
Keywords :
algebra; constraint handling; cryptographic protocols; decidability; formal verification; theorem proving; bounded process analysis; constraint solving; context-explicit protocol decidability; cryptographic protocol; nonfree term algebras; nonstandard attacker inferences; protocol security; protocol verification; theorem proving; Access protocols; Algebra; Computer science; Constraint theory; Cryptographic protocols; Cryptography; Educational institutions; Information systems; Niobium; Security; Constraint solving; Cryptographic protocols; Formal methods; Invariants; Theorem proving;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Parallel and Distributed Processing, 2008. IPDPS 2008. IEEE International Symposium on
Conference_Location :
Miami, FL
ISSN :
1530-2075
Print_ISBN :
978-1-4244-1693-6
Electronic_ISBN :
1530-2075
Type :
conf
DOI :
10.1109/IPDPS.2008.4536556
Filename :
4536556
Link To Document :
بازگشت