Verification of security protocols using LOTOS-method and application

  • Authors:
  • G. Leduc;F. Germeau

  • Affiliations:
  • Research Unit in Networking (RUN), Institut Montefiore B28, University of Liège, B-4000 Liege, Belgium;Research Unit in Networking (RUN), Institut Montefiore B28, University of Liège, B-4000 Liege, Belgium

  • Venue:
  • Computer Communications
  • Year:
  • 2000

Quantified Score

Hi-index 0.25

Visualization

Abstract

We explain how the formal language LOTOS can be used to specify security protocols and cryptographic operations. We describe how security properties can be modelled as safety properties and how a model-based verification method can be used to verify the robustness of a protocol against attacks of an intruder. We illustrate our technique on a concrete registration protocol. We find an attack, correct the protocol, propose a simpler yet secure protocol, and finally a more sophisticated protocol that allows a better discrimination between intruder's attacks and classical protocol errors.