Cryptographically sound and machine-assisted verification of security protocols

30Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We consider machine-aided verification of suitably constructed abstractions of security protocols, such that the verified properties are valid for the concrete implementation of the protocol with respect to cryptographic definitions. In order to link formal methods and cryptography, we show that integrity properties are preserved under step-wise refinement in asynchronous networks with respect to cryptographic definitions, so formal verifications of our abstractions carry over to the concrete counterparts. As an example, we use the theorem prover PVS to formally verify a system for ordered secure message transmission, which yields the first example ever of a formally verified but nevertheless cryptographically sound proof of a security protocol. We believe that a general methodology for verifying cryptographic protocols cryptographically sound can be derived by following the ideas of this example. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Backes, M., & Jacobi, C. (2003). Cryptographically sound and machine-assisted verification of security protocols. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2607, 675–686. https://doi.org/10.1007/3-540-36494-3_59

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free