Deciding cryptographic protocol adequacy with HOL

2Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A cryptographiCprotocolis an algorithm involving exchanges of encrypted information carried out by principals in a distributed environment. It is intended to produce secure communications, even if every message can be read by, or originate with, every principal. This paper gives a definitional tIOL formalization of a "belief logic" based on the full Gong, Needham, and Yahalom [2] logic for analyzing whether protocols achieve desired communication conditions. This gives the "belief logic" a sound formal basis. The paper also sketches the algorithm for a possible HOL tactic automatically constructing proofs that protocols achieve desired communication conditions if they do achieve them.

Cite

CITATION STYLE

APA

Brackin, S. H. (1995). Deciding cryptographic protocol adequacy with HOL. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 971, pp. 90–105). Springer Verlag. https://doi.org/10.1007/3-540-60275-5_59

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free