DocumentCode :
2734560
Title :
Using temporal logic to specify and verify cryptographic protocols
Author :
Gray, James W., III ; McLean, John
Author_Institution :
Dept. of Comput. Sci., Hong Kong Univ. of Sci. & Technol., Kowloon, Hong Kong
fYear :
1995
fDate :
13-15 Jun 1995
Firstpage :
108
Lastpage :
116
Abstract :
We use standard linear-time temporal logic to specify cryptographic protocols, model the system penetrator, and specify correctness requirements. The requirements are specified as standard safety properties, for which standard proof techniques apply. In particular, we are able to prove that the system penetrator cannot obtain a session key by any logical or algebraic techniques. We compare our work to Meadows´ method. We argue that using standard temporal logic provides greater flexibility and generality, firmer foundations, easier integration with other formal methods, and greater confidence in the verification results
Keywords :
cryptography; formal specification; formal verification; protocols; temporal logic; correctness requirements; cryptographic protocols; formal methods; specify; system penetrator; temporal logic; verification; verify; Body sensor networks; Computer science; Councils; Cryptographic protocols; Cryptography; Laboratories; Logic; Random number generation; Safety; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Foundations Workshop, 1995. Proceedings., Eighth IEEE
Conference_Location :
County Kerry
ISSN :
1063-6900
Print_ISBN :
0-8186-7033-9
Type :
conf
DOI :
10.1109/CSFW.1995.518557
Filename :
518557
Link To Document :
بازگشت