Model checking of security protocols with pre-configuration

1Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security protocols are very vulnerable to design errors. Thus many techniques have been proposed for validating the correctness of security protocols. Among these, general model checking is one of the preferred methods. Using tools such as Murψ, model checking can be performed automatically. Thus protocol designers can use it even if they are not proficient in formal techniques. Although this is an attractive approach, state space explosion prohibits model checkers from validating secure protocols with a significant number of communicating participants. In this paper, we propose "model checking with pre-configuration" which is a "divide-and-conquer" approach that reduces the amount of memory needed for verification. The verification time is also reduced since the method permits the use of symmetry more effectively in model checking. The performance of the method is shown by checking the NeedhamSchroeder-Lowe Public-Key protocol using Murψ. © Springer-Verlag 2004.

Cite

CITATION STYLE

APA

Kim, K., Abraham, J. A., & Bhadra, J. (2004). Model checking of security protocols with pre-configuration. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2908, 1–15. https://doi.org/10.1007/978-3-540-24591-9_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free