DocumentCode
2236680
Title
Verifying authentication protocols: methodology and example
Author
Woo, Thomas Y C ; Lam, Simon S.
Author_Institution
Dept. of Comput. Sci., Texas Univ., Austin, TX, USA
fYear
1993
fDate
19-22 Oct 1993
Firstpage
36
Lastpage
45
Abstract
The authors present a new approach to the analysis of authentication protocols. The approach consists of several elements: a specification language for formally specifying authentication protocols, a semantic model for characterizing protocol executions, an assertion language for stating secrecy and correspondence properties, and procedures for verifying these properties. The main emphasis of this paper is on the assertion language, its semantics, and verification procedures. In particular, the authors present a set of proof rules. An example is given to illustrate the approach
Keywords
formal specification; formal verification; message authentication; protocols; specification languages; telecommunication computing; assertion language; authentication protocols analysis; correspondence properties; formal specification; proof rules; protocol executions; secrecy; semantic model; specification language; verification procedures; Authentication; Body sensor networks; Computer security; Contracts; Logic; Proposals; Protocols; Specification languages; Workstations;
fLanguage
English
Publisher
ieee
Conference_Titel
Network Protocols, 1993. Proceedings., 1993 International Conference on
Conference_Location
San Francisco, CA
Print_ISBN
0-8186-3670-X
Type
conf
DOI
10.1109/ICNP.1993.340904
Filename
340904
Link To Document