DocumentCode :
2817451
Title :
Using SPIN to model cryptographic protocols
Author :
Yongjian, Li ; Rui, Xue
Author_Institution :
Lab. of Comput. Sci., Chinese Acad. of Sci., Beijing, China
Volume :
2
fYear :
2004
fDate :
5-7 April 2004
Firstpage :
741
Abstract :
We explore the use of Spin to model cryptographic protocols, and propose a general method to define the data structures used in the verification, such as facts, the intruder´s knowledge, and so on. Based on this, we develop a general method to model the behaviors of honest principals and the intruder, in particular; we propose a general model for the intruder´s deduction system. The method can be adapted to different protocols, and make it possible to transform a more abstract description of a sample protocol instance to Promela code. Our method is illustrated by using a revised TMN protocol, and the verification result has shown that it is a practical and useful way to analyze cryptographic protocols.
Keywords :
cryptography; data structures; formal verification; message authentication; protocols; safety systems; Promela code; TMN protocol; cryptographic protocols; data structures; intruder deduction system; Computer science; Contracts; Cryptographic protocols; Cryptography; Data structures; Electronic mail; Information security; Laboratories;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. International Conference on
Print_ISBN :
0-7695-2108-8
Type :
conf
DOI :
10.1109/ITCC.2004.1286745
Filename :
1286745
Link To Document :
بازگشت