Skip to Main Content
Cryptographic protocols provide frameworks for communicating, authenticating, and exchanging secrets in sundry situations. Protocol assessment for discovering design flaws requires modeling and analyzing the protocol. Protocol analysis reveals attacks that an intruder can use. The proposed methodology provides an effective means for analyzing protocols by using message-pattern matching and goal extraction. The algorithmic approach for goal extraction and analysis has potential for automated protocol analysis.
Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. International Conference on (Volume:1 )
Date of Conference: 5-7 April 2004