DocumentCode
1425697
Title
Verifying authentication protocols in CSP
Author
Schneider, Steve
Author_Institution
Dept. of Comput. Sci., R. Holloway Univ. of London, Egham, UK
Volume
24
Issue
9
fYear
1998
fDate
9/1/1998 12:00:00 AM
Firstpage
741
Lastpage
758
Abstract
This paper presents a general approach for analysis and verification of authentication properties using the theory of Communicating Sequential Processes (CSP). The paper aims to develop a specific theory appropriate to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach aims to combine the ability to express such protocols in a natural and precise way with the ability to reason formally about the properties they exhibit. The theory is illustrated by an examination of the Needham-Schroeder (1978) public key protocol. The protocol is first examined with respect to a single run and then more generally with respect to multiple concurrent runs
Keywords
communicating sequential processes; formal verification; message authentication; protocols; public key cryptography; CSP; Communicating Sequential Processes; Needham-Schroeder protocol; authentication protocol verification; public key protocol; semantic framework; Authentication; Computer Society; Digital signatures; IEC standards; ISO standards; Logic; Protocols; Public key; Security;
fLanguage
English
Journal_Title
Software Engineering, IEEE Transactions on
Publisher
ieee
ISSN
0098-5589
Type
jour
DOI
10.1109/32.713329
Filename
713329
Link To Document