Tools for cryptographic protocols analysis: A technical and experimental comparison

  • Authors:
  • Manuel Cheminod;Ivan Cibrario Bertolotti;Luca Durante;Riccardo Sisto;Adriano Valenzano

  • Affiliations:
  • IEIIT-CNR, c.so Duca degli Abruzzi 24, I-10129 Torino, Italy;IEIIT-CNR, c.so Duca degli Abruzzi 24, I-10129 Torino, Italy;IEIIT-CNR, c.so Duca degli Abruzzi 24, I-10129 Torino, Italy;Politecnico di Torino, c.so Duca degli Abruzzi 24, I-10129 Torino, Italy;IEIIT-CNR, c.so Duca degli Abruzzi 24, I-10129 Torino, Italy

  • Venue:
  • Computer Standards & Interfaces
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The tools for cryptographic protocols analysis based on state exploration are designed to be completely automatic and should carry out their job with a reasonable amount of computing and storage resources, even when run by users having a limited amount of expertise in the field. This paper compares four tools of this kind to highlight their features and ability to detect bugs under the same experimental conditions. To this purpose, the ability of each tool to detect known flaws in a uniform set of well-known cryptographic protocols has been checked. Results are also given on the relative performance of the tools when analysing several known-good protocols with an increasing number of parallel sessions.