Loading [MathJax]/extensions/MathMenu.js
What is the best way to prove a cryptographic protocol correct? | IEEE Conference Publication | IEEE Xplore

What is the best way to prove a cryptographic protocol correct?


Abstract:

In this paper, we identify that protocol verification using invariants have significant limitations such as inapplicability to some protocols, non-standard attacker infer...Show More

Abstract:

In this paper, we identify that protocol verification using invariants have significant limitations such as inapplicability to some protocols, non-standard attacker inferences and non-free term algebras. We argue that constraint solving for bounded process analysis can be used in conjunction with decidability of context-explicit protocols as a verification tool and can overcome those limitations. However, this is possible only when new decidability results are obtained for protocol security, especially in presence of non-standard inferences and non-free term algebras.
Date of Conference: 14-18 April 2008
Date Added to IEEE Xplore: 03 June 2008
ISBN Information:
Print ISSN: 1530-2075
Conference Location: Miami, FL, USA
College of Business and Information Systems, Dakota State University, Madison, SD, USA
Department of Math and Computer Science, University of Maryland, Eastern Shore, Princess Anne, MD, USA

College of Business and Information Systems, Dakota State University, Madison, SD, USA
Department of Math and Computer Science, University of Maryland, Eastern Shore, Princess Anne, MD, USA
Contact IEEE to Subscribe

References

References is not available for this document.