DocumentCode :
258539
Title :
On modelling security protocols for logic-based verification
Author :
Dojen, Reiner ; Jinyong Chen ; Coffey, Tom
Author_Institution :
Dept. of Electron. & Comput. Eng., Univ. of Limerick, Limerick, Ireland
fYear :
2013
fDate :
26-27 June 2013
Firstpage :
79
Lastpage :
84
Abstract :
Formal verification is an imperative step in the design cycle of security protocols. One of the most critical steps in formal verification is the formalisation of the security protocol in the language of the verification technique, as any mistakes in the formalisation can invalidate the outcome of the verification. However, security protocols are constantly evolving. Hence, verification techniques need to be adjusted to facilitate appropriate formalisations of newly arising features or operations of security protocols. This paper concerns modelling security protocols for formal verification. Different ways to model lightweight operations in a logic-based verification tool are discussed. An extension of the verification tool, that facilitates direct modelling of lightweight operations in security protocols, is then described. Finally, a remote authentication scheme is formalised and verified using the extended tool.
Keywords :
cryptographic protocols; formal logic; formal verification; formal verification; logic-based verification tool; remote authentication scheme; security protocol formalisation; security protocol modelling; Formal verification; exclusive-or operation; logic based verification tool; remote user authentication protocol;
fLanguage :
English
Publisher :
iet
Conference_Titel :
Irish Signals & Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communications Technologies (ISSC 2014/CIICT 2014). 25th IET
Conference_Location :
Limerick
Type :
conf
DOI :
10.1049/cp.2014.0663
Filename :
6912734
Link To Document :
بازگشت