ACM Transactions on Computer Systems (TOCS)
The digital signature standard
Communications of the ACM
Message authentication with one-way hash functions
ACM SIGCOMM Computer Communication Review
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
An approach to the formal verification of cryptographic protocols
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Formal verification in a commercial setting
DAC '97 Proceedings of the 34th annual Design Automation Conference
A calculus for cryptographic protocols: the spi calculus
Proceedings of the 4th ACM conference on Computer and communications security
Secrecy by Typing inSecurity Protocols
TACS '97 Proceedings of the Third International Symposium on Theoretical Aspects of Computer Software
SG Logic- A Formal Analysis Technique for Authentication Protocols
Proceedings of the 5th International Workshop on Security Protocols
Proving Properties of Security Protocols by Induction
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Hi-index | 0.00 |
This paper introduces a key correlation based cryptographic protocol analyzer. This analyzer uses network events and information as inputs and applies a set of abstract interpretation techniques for key correlation-reuse detection purpose. CSA or Correlation System Analyzer has been designed in two modules : Information collection sniffers or sondes and information analyzer that is based on formal verification method The designed tool tracks coherence and freshness of cryptographic keys used through an SSL (Secure Socket Layer) or SSH (Secure SHell) sessions. CSA is also able to verify secret preservation of crucial information by propagating specific constraints. This paper describes CSA global architecture and operator mode, it also includes significant results and experimentations.