Title :
Decomposition techniques for cryptographic protocol analysis
Author :
Morton, Cynthia M. ; Robart, Lewis C. ; Tavares, Stafford E.
Author_Institution :
Domus Software, Ottawa, Ont., Canada
Abstract :
In this paper, decomposition techniques are used to simplify the analysis of cryptographic protocols using coloured Petri nets to locate security flaws and weaknesses. These techniques exploit the inherent modularity of the Petri net model which is composed of distinct protocol entities, distinct protocol stages, and an explicit intruder model. The intruder model may embody a suite of threat characteristics, which can be used to formulate simple or complex attacks. The methodology is described in this paper and is applied to a one-way authentication protocol with two stages
Keywords :
Petri nets; cryptography; message authentication; protocols; coloured Petri nets; cryptographic protocol analysis; decomposition techniques; explicit intruder model; inherent modularity; methodology; one-way authentication protocol; protocol; security; threat characteristics; wireless communication systems; Communication system security; Cryptography; Data security; Petri nets; Protocols;
Conference_Titel :
Electrical and Computer Engineering, 1994. Conference Proceedings. 1994 Canadian Conference on
Conference_Location :
Halifax, NS
Print_ISBN :
0-7803-2416-1
DOI :
10.1109/CCECE.1994.405757