Title :
Using narrowing in the analysis of key management protocols
Author :
Meadows, Catherine
Author_Institution :
US Naval Res. Lab., Washington, DC, USA
Abstract :
The author develops methods for analyzing cryptographic protocols using techniques developed for the solutions of equations in a term rewriting system. In particular, she describes a model of a class of cryptographic protocols and possible attacks on those protocols as term rewriting systems. She also describes a software tool based on the narrowing algorithm that can be used in the analysis of such protocols. Finally, she uses the tool in the analysis of a simple protocol and outlines ways in which the tool might be improved to provide greater assistance in the analysis of more complex protocols
Keywords :
cryptography; protocols; rewriting systems; security of data; software tools; attacks; cryptographic protocols; equations; key management protocols; narrowing algorithm; software tool; term rewriting system; Algorithm design and analysis; Cryptographic protocols; Cryptography; Equations; Graphics; Hardware; Information analysis; Information technology; Laboratories; Security;
Conference_Titel :
Security and Privacy, 1989. Proceedings., 1989 IEEE Symposium on
Conference_Location :
Oakland, CA
Print_ISBN :
0-8186-1939-2
DOI :
10.1109/SECPRI.1989.36288