• DocumentCode
    2817451
  • Title

    Using SPIN to model cryptographic protocols

  • Author

    Yongjian, Li ; Rui, Xue

  • Author_Institution
    Lab. of Comput. Sci., Chinese Acad. of Sci., Beijing, China
  • Volume
    2
  • fYear
    2004
  • fDate
    5-7 April 2004
  • Firstpage
    741
  • Abstract
    We explore the use of Spin to model cryptographic protocols, and propose a general method to define the data structures used in the verification, such as facts, the intruder´s knowledge, and so on. Based on this, we develop a general method to model the behaviors of honest principals and the intruder, in particular; we propose a general model for the intruder´s deduction system. The method can be adapted to different protocols, and make it possible to transform a more abstract description of a sample protocol instance to Promela code. Our method is illustrated by using a revised TMN protocol, and the verification result has shown that it is a practical and useful way to analyze cryptographic protocols.
  • Keywords
    cryptography; data structures; formal verification; message authentication; protocols; safety systems; Promela code; TMN protocol; cryptographic protocols; data structures; intruder deduction system; Computer science; Contracts; Cryptographic protocols; Cryptography; Data structures; Electronic mail; Information security; Laboratories;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. International Conference on
  • Print_ISBN
    0-7695-2108-8
  • Type

    conf

  • DOI
    10.1109/ITCC.2004.1286745
  • Filename
    1286745