Verifying cryptographic protocols for electronic commerce

  • Authors:
  • Randall W. Lichota;Grace L. Hammonds;Stephen H. Brackin

  • Affiliations:
  • Hughes Technical Services Company, Fullerton, CA;AGCS, Inc., Stoneham, MA;Arca Systems, Inc., Ithaca, NY

  • Venue:
  • WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
  • Year:
  • 1996

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper describes the Convince toolset for detecting common errors in cryptographic protocols, protocols of the sort used in electronic commerce. We describe using Convince to analyze confidentiality, authentication, and key distribution in a recently developed protocol proposed for incorporation into a network bill-payment system, a public-key version of the Kerberos authentication protocol. Convince incorporates a "belief logic" formalism into a theorem-proving environment that automatically proves whether a protocol can meet its goals. Convince allows an analyst to model a protocol using a tool originally designed for Computer-Aided Software Engineering (CASE).