• DocumentCode
    2236680
  • Title

    Verifying authentication protocols: methodology and example

  • Author

    Woo, Thomas Y C ; Lam, Simon S.

  • Author_Institution
    Dept. of Comput. Sci., Texas Univ., Austin, TX, USA
  • fYear
    1993
  • fDate
    19-22 Oct 1993
  • Firstpage
    36
  • Lastpage
    45
  • Abstract
    The authors present a new approach to the analysis of authentication protocols. The approach consists of several elements: a specification language for formally specifying authentication protocols, a semantic model for characterizing protocol executions, an assertion language for stating secrecy and correspondence properties, and procedures for verifying these properties. The main emphasis of this paper is on the assertion language, its semantics, and verification procedures. In particular, the authors present a set of proof rules. An example is given to illustrate the approach
  • Keywords
    formal specification; formal verification; message authentication; protocols; specification languages; telecommunication computing; assertion language; authentication protocols analysis; correspondence properties; formal specification; proof rules; protocol executions; secrecy; semantic model; specification language; verification procedures; Authentication; Body sensor networks; Computer security; Contracts; Logic; Proposals; Protocols; Specification languages; Workstations;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Network Protocols, 1993. Proceedings., 1993 International Conference on
  • Conference_Location
    San Francisco, CA
  • Print_ISBN
    0-8186-3670-X
  • Type

    conf

  • DOI
    10.1109/ICNP.1993.340904
  • Filename
    340904