Title :
Verifying authentication protocols: methodology and example
Author :
Woo, Thomas Y C ; Lam, Simon S.
Author_Institution :
Dept. of Comput. Sci., Texas Univ., Austin, TX, USA
Abstract :
The authors present a new approach to the analysis of authentication protocols. The approach consists of several elements: a specification language for formally specifying authentication protocols, a semantic model for characterizing protocol executions, an assertion language for stating secrecy and correspondence properties, and procedures for verifying these properties. The main emphasis of this paper is on the assertion language, its semantics, and verification procedures. In particular, the authors present a set of proof rules. An example is given to illustrate the approach
Keywords :
formal specification; formal verification; message authentication; protocols; specification languages; telecommunication computing; assertion language; authentication protocols analysis; correspondence properties; formal specification; proof rules; protocol executions; secrecy; semantic model; specification language; verification procedures; Authentication; Body sensor networks; Computer security; Contracts; Logic; Proposals; Protocols; Specification languages; Workstations;
Conference_Titel :
Network Protocols, 1993. Proceedings., 1993 International Conference on
Conference_Location :
San Francisco, CA
Print_ISBN :
0-8186-3670-X
DOI :
10.1109/ICNP.1993.340904