Author_Institution :
Sch. of Comput., Nat. Univ. of Singapore, Singapore, Singapore
Abstract :
Security protocols play more and more important role nowadays, ranging from banking to electronic commerce systems. They are designed to provide properties such as authentication, key exchanges, key distribution, non-repudiation, proof of origin, integrity, confidentiality and anonymity, for users who wish to exchange messages over a medium over which they have little control. These properties are often difficult to characterize formally (or even informally). The protocols themselves often contain a great deal of combinatorial complexity, making their verification extremely difficult and prone to error. To overcome these obstacles, many different approaches are proposed such as using theorem provers or ranking systems. However, they are lack of automation, sufficiency in demand or time verification. In this paper, we will propose an approach using Real Time System (RTS) and an model checker PAT to deal with these problems.
Keywords :
cryptographic protocols; electronic commerce; program verification; real-time systems; PAT approach; RTS; authentication; combinatorial complexity; electronic commerce systems; key distribution; key exchanges; message exchange; real time system; security protocols; Algebra; Authentication; Automation; Banking; Cryptographic protocols; Electronic commerce; Explosions; National security; Public key cryptography; Real time systems; PAT; RTS; Security protocol; verification;