Performance Evaluation of Security Protocols Specified in LySa

  • Authors:
  • Chiara Bodei;Michele Curti;Pierpaolo Degano;Mikael Buchholtz;Flemming Nielson;Hanne Riis Nielson;Corrado Priami

  • Affiliations:
  • Dipartimento di Informatica, Università di Pisa, Viale F. Buonarroti, 2, I-56127 Pisa, Italy;Dipartimento di Informatica, Università di Pisa, Viale F. Buonarroti, 2, I-56127 Pisa, Italy;Dipartimento di Informatica, Università di Pisa, Viale F. Buonarroti, 2, I-56127 Pisa, Italy;Informatics and Mathematical Modelling, Technical University of Denmark, Richard Petersens Plads bldg 321, DK-2800 Kongens Lyngby, Denmark;Informatics and Mathematical Modelling, Technical University of Denmark, Richard Petersens Plads bldg 321, DK-2800 Kongens Lyngby, Denmark;Informatics and Mathematical Modelling, Technical University of Denmark, Richard Petersens Plads bldg 321, DK-2800 Kongens Lyngby, Denmark;Dipartimento di Informatica e Telecomunicazioni, Università di Trento, Via Sommarive, 14 -- 38050 Povo (TN), Italy

  • Venue:
  • Electronic Notes in Theoretical Computer Science (ENTCS)
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

We use a special operational semantics which drives us in inferring quantitative measures on system describing cryptographic protocols. The transitions of the system carry enhanced labels. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools.