Sciweavers

CSFW
2000
IEEE

Towards Automatic Verification of Authentication Protocols on an Unbounded Network

14 years 4 months ago
Towards Automatic Verification of Authentication Protocols on an Unbounded Network
Schneider's work on rank functions [14] provides a formal approach to verification of certain properties of a security protocol. However, he illustrates the approach only with a protocol running on a small network; and no help is given with the somewhat hit-and-miss process of finding the rank function which underpins the central theorem. In this paper, we develop the theory to allow for an arbitrarily large network, and give a clearly defined decision procedure by which one may either construct a rank function, proving correctness of the protocol, or show that no rank function exists. We discuss the implications of the absence of a rank function, and the open question of completeness of the rank function theorem.
James Heather, Steve Schneider
Added 24 Aug 2010
Updated 24 Aug 2010
Type Conference
Year 2000
Where CSFW
Authors James Heather, Steve Schneider
Comments (0)