Abstract:
Cryptographic protocols provide frameworks for communicating, authenticating, and exchanging secrets in sundry situations. Protocol assessment for discovering design flaw...Show MoreMetadata
Abstract:
Cryptographic protocols provide frameworks for communicating, authenticating, and exchanging secrets in sundry situations. Protocol assessment for discovering design flaws requires modeling and analyzing the protocol. Protocol analysis reveals attacks that an intruder can use. The proposed methodology provides an effective means for analyzing protocols by using message-pattern matching and goal extraction. The algorithmic approach for goal extraction and analysis has potential for automated protocol analysis.
Published in: International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004.
Date of Conference: 05-07 April 2004
Date Added to IEEE Xplore: 24 August 2004
Print ISBN:0-7695-2108-8