DocumentCode
2817451
Title
Using SPIN to model cryptographic protocols
Author
Yongjian, Li ; Rui, Xue
Author_Institution
Lab. of Comput. Sci., Chinese Acad. of Sci., Beijing, China
Volume
2
fYear
2004
fDate
5-7 April 2004
Firstpage
741
Abstract
We explore the use of Spin to model cryptographic protocols, and propose a general method to define the data structures used in the verification, such as facts, the intruder´s knowledge, and so on. Based on this, we develop a general method to model the behaviors of honest principals and the intruder, in particular; we propose a general model for the intruder´s deduction system. The method can be adapted to different protocols, and make it possible to transform a more abstract description of a sample protocol instance to Promela code. Our method is illustrated by using a revised TMN protocol, and the verification result has shown that it is a practical and useful way to analyze cryptographic protocols.
Keywords
cryptography; data structures; formal verification; message authentication; protocols; safety systems; Promela code; TMN protocol; cryptographic protocols; data structures; intruder deduction system; Computer science; Contracts; Cryptographic protocols; Cryptography; Data structures; Electronic mail; Information security; Laboratories;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. International Conference on
Print_ISBN
0-7695-2108-8
Type
conf
DOI
10.1109/ITCC.2004.1286745
Filename
1286745
Link To Document