Title :
Using temporal logic to specify and verify cryptographic protocols
Author :
Gray, James W., III ; McLean, John
Author_Institution :
Dept. of Comput. Sci., Hong Kong Univ. of Sci. & Technol., Kowloon, Hong Kong
Abstract :
We use standard linear-time temporal logic to specify cryptographic protocols, model the system penetrator, and specify correctness requirements. The requirements are specified as standard safety properties, for which standard proof techniques apply. In particular, we are able to prove that the system penetrator cannot obtain a session key by any logical or algebraic techniques. We compare our work to Meadows´ method. We argue that using standard temporal logic provides greater flexibility and generality, firmer foundations, easier integration with other formal methods, and greater confidence in the verification results
Keywords :
cryptography; formal specification; formal verification; protocols; temporal logic; correctness requirements; cryptographic protocols; formal methods; specify; system penetrator; temporal logic; verification; verify; Body sensor networks; Computer science; Councils; Cryptographic protocols; Cryptography; Laboratories; Logic; Random number generation; Safety; Security;
Conference_Titel :
Computer Security Foundations Workshop, 1995. Proceedings., Eighth IEEE
Conference_Location :
County Kerry
Print_ISBN :
0-8186-7033-9
DOI :
10.1109/CSFW.1995.518557