An approach to the formal verification of the two-party cryptographic protocols

  • Authors:
  • Yuqing Zhang;Jihong Li;Guozhen Xiao

  • Affiliations:
  • State Key Lab on ISN, Xidian University, Xi'an, 710071, P. R. China, Institute of Information Security, Xidian University, Xi'an, 710071, P. R. China;State Key Lab on ISN, Xidian University, Xi'an, 710071, P. R. China, Institute of Information Security, Xidian University, Xi'an, 710071, P. R. China;State Key Lab on ISN, Xidian University, Xi'an, 710071, P. R. China, Institute of Information Security, Xidian University, Xi'an, 710071, P. R. China

  • Venue:
  • ACM SIGOPS Operating Systems Review
  • Year:
  • 1999

Quantified Score

Hi-index 0.00

Visualization

Abstract

A general method, which can be used to verify the two-party cryptographic protocols, is present in this paper. Our approach makes use of running modes of the two-party cryptographic protocols to analyze the protocols. Based on this method, the verification of the protocols becomes independent of model checking tools. Finally, this approach is illustrated with an example on the Needham-Schroeder public-key protocol.