Integrating security in a large distributed system
ACM Transactions on Computer Systems (TOCS)
ACM Transactions on Computer Systems (TOCS)
Coloured Petri nets: basic concepts, analysis methods and practical use, volume 3
Coloured Petri nets: basic concepts, analysis methods and practical use, volume 3
Some new attacks upon security protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
On the security of public key protocols
SFCS '81 Proceedings of the 22nd Annual Symposium on Foundations of Computer Science
Hi-index | 0.00 |
Authentication protocols are the basis of security in networks. Therefore, it is essential to ensure that these protocols correctly. However, it is difficult to design authentication protocols that are immune to malicious attack, since good analysis techniques are lacking. In this paper, combining some analysis methods currently for analysis of security protocols based on Petri Nets methods together, a Colored Petri Net for the Andrew secure RPC protocol fixed in [10] has been presented. And then an intruder model is developed and integrated into the protocol model. Model checking is performed in CPN Tools. In the model checking, two methods are used. After model checking and the state space analysis, an attack is found.