Modeling and verification of cryptographic protocols using coloured petri nets and design/CPN

  • Authors:
  • Issam Al-Azzoni;Douglas G. Down;Ridha Khedri

  • Affiliations:
  • McMaster University, Hamilton, Ontario, Canada;McMaster University, Hamilton, Ontario, Canada;McMaster University, Hamilton, Ontario, Canada

  • Venue:
  • Nordic Journal of Computing
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we present a technique to model and analyse cryptographic protocols using coloured petri nets. A model of the protocol is constructed in a top-down manner: first the protocol is modeled without an intruder, then a generic intruder model is added. The technique is illustrated on the TMN protocol, with several mechanisms introduced to reduce the size of the occurrence graph. A smaller occurrence graph facilitates deducing whether particular security goals are met.