Just fast keying in the Pi Calculus

54Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

JFK is a recent, attractive protocol for fast key establishment as part of securing IP communication. In this paper, we analyze it formally in the applied pi calculus (partly in terms of observational equivalences, partly with the assistance of an automatic protocol verifier). We treat JFK's core security properties, and also other properties that are rarely articulated and studied rigorously, such as resistance to denial-of-service attacks. In the course of this analysis we found some ambiguities and minor problems, but we mostly obtain positive results about JFK. For this purpose, we develop ideas and techniques that should be useful more generally in the specification and verification of security protocols. © Springer-Verlag 2004.

Cite

CITATION STYLE

APA

Abadil, M., Blanchet, B., & Fournet, C. (2004). Just fast keying in the Pi Calculus. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2986, 340–354. https://doi.org/10.1007/978-3-540-24725-8_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free