Verifying authentication protocol implementations

  • Authors:
  • Steve Schneider

  • Affiliations:
  • Department of Computer Science, Royal Holloway, University of London

  • Venue:
  • FMOODS '02 Proceedings of the IFIP TC6/WG6.1 Fifth International Conference on Formal Methods for Open Object-Based Distributed Systems V
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

Formal methods for verifying authentication protocols tend to assume an idealised, perfect form of encryption. This approach has been spectacularly successful in finding flaws, but when we aim for proofs of correctness then we need to consider this assumption more carefully, and perhaps to weaken it to reflect properties of real cryptographic mechanisms. This paper reviews the existing CSP approach to verifying protocols, and considers how algebraic properties of real cryptographic mechanisms can be incorporated within a rank function verification. The approach is illustrated with an authentication protocol which makes use of exclusive-or.