Verifying authentication protocols with CSP

  • Authors:
  • Steve Schneider

  • Affiliations:
  • -

  • Venue:
  • CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
  • Year:
  • 1997

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper presents a general approach for analysis and verification of authentication properties in the language of Communicating Sequential Processes (CSP). It is illustrated by an examination of the Needham-Schroeder public-key protocol. The contribution of this paper is to develop a specific theory appropriate to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach aims to combine the ability to express such protocols in a natural and precise way with the facility to reason formally about the properties they exhibit.