Using temporal logic to specify and verify cryptographic protocols

  • Authors:
  • J. W. , Iii Gray;J. McLean

  • Affiliations:
  • -;-

  • Venue:
  • CSFW '95 Proceedings of the 8th IEEE workshop on Computer Security Foundations
  • Year:
  • 1995

Quantified Score

Hi-index 0.00

Visualization

Abstract

We use standard linear-time temporal logic to specify cryptographic protocols, model the system penetrator, and specify correctness requirements. The requirements are specified as standard safety properties, for which standard proof techniques apply. In particular, we are able to prove that the system penetrator cannot obtain a session key by any logical or algebraic techniques. We compare our work to Meadows' method. We argue that using standard temporal logic provides greater flexibility and generality, firmer foundations, easier integration with other formal methods, and greater confidence in the verification results.