Protocol analysis for concrete environments

  • Authors:
  • Dieter Gollmann

  • Affiliations:
  • TU Hamburg-Harburg, Hamburg, Germany

  • Venue:
  • EUROCAST'05 Proceedings of the 10th international conference on Computer Aided Systems Theory
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

For protocol analysis, we have to capture the protocol specification, the security goals of the protocol, and the communications environment it is expected to run in. In the research literature, the emphasis is usually on verification techniques and on the modelling of security properties, while in most cases the default for the communications environment is an unstructured network totally controlled by the attacker. This paper will argue that for the analysis of the kind of protocols developed today, more specific models of the communications network are required. To support this argument, a number of recently proposed security protocols with novel features will be briefly discussed.