DocumentCode :
1425697
Title :
Verifying authentication protocols in CSP
Author :
Schneider, Steve
Author_Institution :
Dept. of Comput. Sci., R. Holloway Univ. of London, Egham, UK
Volume :
24
Issue :
9
fYear :
1998
fDate :
9/1/1998 12:00:00 AM
Firstpage :
741
Lastpage :
758
Abstract :
This paper presents a general approach for analysis and verification of authentication properties using the theory of Communicating Sequential Processes (CSP). The paper aims to develop a specific theory appropriate to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach aims to combine the ability to express such protocols in a natural and precise way with the ability to reason formally about the properties they exhibit. The theory is illustrated by an examination of the Needham-Schroeder (1978) public key protocol. The protocol is first examined with respect to a single run and then more generally with respect to multiple concurrent runs
Keywords :
communicating sequential processes; formal verification; message authentication; protocols; public key cryptography; CSP; Communicating Sequential Processes; Needham-Schroeder protocol; authentication protocol verification; public key protocol; semantic framework; Authentication; Computer Society; Digital signatures; IEC standards; ISO standards; Logic; Protocols; Public key; Security;
fLanguage :
English
Journal_Title :
Software Engineering, IEEE Transactions on
Publisher :
ieee
ISSN :
0098-5589
Type :
jour
DOI :
10.1109/32.713329
Filename :
713329
Link To Document :
بازگشت