We investigate the applicability of symbolic exploration to the automatic verification of secrecy and authentication properties for time sensitive cryptographic protocols. Our formal specifications are given in multiset rewriting over first order atomic formulas enriched with constraints so as to uniformly model fresh name generation and validity condition of time stamps. Our verification approach is based on data structures for symbolically representing sets of configurations of an arbitrary number of parallel protocol sessions. As a case study we discuss the verification of timed authentication for the Wide Mouth Frog protocol. © Springer-Verlag 2004.
CITATION STYLE
Delzanno, G., & Ganty, P. (2004). Automatic Verification of Time Sensitive Cryptographic Protocols. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2988, 342–356. https://doi.org/10.1007/978-3-540-24730-2_27
Mendeley helps you to discover research relevant for your work.