What is the best way to prove a cryptographic protocol correct? | IEEE Conference Publication | IEEE Xplore

What is the best way to prove a cryptographic protocol correct?


Abstract:

In this paper, we identify that protocol verification using invariants have significant limitations such as inapplicability to some protocols, non-standard attacker infer...Show More

Abstract:

In this paper, we identify that protocol verification using invariants have significant limitations such as inapplicability to some protocols, non-standard attacker inferences and non-free term algebras. We argue that constraint solving for bounded process analysis can be used in conjunction with decidability of context-explicit protocols as a verification tool and can overcome those limitations. However, this is possible only when new decidability results are obtained for protocol security, especially in presence of non-standard inferences and non-free term algebras.
Date of Conference: 14-18 April 2008
Date Added to IEEE Xplore: 03 June 2008
ISBN Information:
Print ISSN: 1530-2075
Conference Location: Miami, FL, USA

Contact IEEE to Subscribe

References

References is not available for this document.