Show simple item record

Formal Methods for the Analysis of Authentication Protocols

dc.contributor.authorRubin, A. D.en_US
dc.contributor.authorHoneyman, P.en_US
dc.date.accessioned2014-07-18T18:12:04Z
dc.date.available2014-07-18T18:12:04Z
dc.date.issued1993-11-08en_US
dc.identifier.citationA. D. Rubin and P. Honeyman, "Formal Methods for the Analysis of Authentication Protocols," October 1993. <http://hdl.handle.net/2027.42/107949>en_US
dc.identifier.urihttps://hdl.handle.net/2027.42/107949
dc.description.abstractIn this paper, we examine current approaches and the state of the art in the application of formal methods to the analysis of cryptographic protocols. We use Meadows' classification of analysis techniques into four types. The Type I approach models and verifies a protocol using specification languages and verification tools not specifically developed for the analysis of cryptographic protocols. In the Type II approach, a protocol designer develops expert systems to create and examine different scenarios, from which she may draw conclusions about the security of the protocols being studied. The Type III approach models the requirements of a protocol family using logics developed specifically for the analysis of knowledge and belief. Finally, the Type IV approach develops a formal model based on the algebraic term-rewriting properties of cryptographic systems. The majority of research and the most interesting results are in the Type III approach, including reasoning systems such as the BAN logic; we present these systems and compare their relative merits. While each approach has its benefits, no current method is able to provide a rigorous proof that a protocol is secure.en_US
dc.publisherCenter for Information Technology Integrationen_US
dc.titleFormal Methods for the Analysis of Authentication Protocolsen_US
dc.typeTechnical Reporten_US
dc.subject.hlbsecondlevelComputer Scienceen_US
dc.subject.hlbtoplevelEngineeringen_US
dc.contributor.affiliationumCenter for Information Technology Integrationen_US
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/107949/1/citi-tr-93-7.pdf
dc.owningcollnameElectrical Engineering and Computer Science, Department of (EECS)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.