Sciweavers

IFIP
2004
Springer

Complementing Computational Protocol Analysis with Formal Specifications

14 years 5 months ago
Complementing Computational Protocol Analysis with Formal Specifications
Abstract The computational proof model of Bellare and Rogaway for cryptographic protocol analysis is complemented by providing a formal specification of the actions of the adversary and the protocol entities. This allows a matching model to be used in both a machine-generated analysis and a human-generated computational proof. Using a protocol of Jakobsson and Pointcheval as a case study, it is demonstrated that flaws in the protocol could have been found with this approach, providing evidence that the combination of human and computer analysis can be more effective than either alone. As well as finding the known flaw, previously unknown flaws in the protocol are discovered by the automatic analysis.
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchco
Added 02 Jul 2010
Updated 02 Jul 2010
Type Conference
Year 2004
Where IFIP
Authors Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland
Comments (0)