Analysis of authentication protocols with Scyter: case study

  • Authors:
  • Očenášek Pavel

  • Affiliations:
  • Faculty of Information Technology, Brno University of Technology, Brno, Czech Republic

  • Venue:
  • HI'11 Proceedings of the 2011 international conference on Human interface and the management of information - Volume Part I
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper describes one of possible implementations of method used for protocol design described in a paper from 1998 by L. Buttyán, S. Staamann and U. Wilhelm which proposes a backward search (regression) when synthesizing an authentication protocol. Furthermore, the approach presented in this paper allows a designer to define participants who are trustworthy enough to transfer information between other two participants without existence of a direct channel to achieve basic routing functionality.