首页 | 本学科首页   官方微博 | 高级检索  
     


Three systems for cryptographic protocol analysis
Authors:R Kemmerer  C Meadows  J Millen
Affiliation:(1) Computer Science Department, University of California, 93106 Santa Barbara, CA, USA;(2) U.S. Naval Research Laboratory, 4555 Overlook Avenue, SW, 20375 Washington, DC, USA;(3) The MITRE Corporation, 01730 Bedford, MA, USA
Abstract:Three experimental methods have been developed to help apply formal methods to the security verification of cryptographic protocols of the sort used for key distribution and authentication. Two of these methods are based on Prolog programs, and one is based on a general-purpose specification and verification system. All three combine algebraic with state-transition approaches. For purposes of comparison, they were used to analyze the same example protocol with a known flaw.
Keywords:Interrogator  Narrower  Inatest  Ina Jo  Key distribution  Authentication  Security  Protocols  Formal methods  Specification  Verification
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号