Formal Methods for the Analysis of Authentication Protocols
dc.contributor.author | Rubin, A. D. | en_US |
dc.contributor.author | Honeyman, P. | en_US |
dc.date.accessioned | 2014-07-18T18:12:04Z | |
dc.date.available | 2014-07-18T18:12:04Z | |
dc.date.issued | 1993-11-08 | en_US |
dc.identifier.citation | A. D. Rubin and P. Honeyman, "Formal Methods for the Analysis of Authentication Protocols," October 1993. <http://hdl.handle.net/2027.42/107949> | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/107949 | |
dc.description.abstract | In this paper, we examine current approaches and the state of the art in the application of formal methods to the analysis of cryptographic protocols. We use Meadows' classification of analysis techniques into four types. The Type I approach models and verifies a protocol using specification languages and verification tools not specifically developed for the analysis of cryptographic protocols. In the Type II approach, a protocol designer develops expert systems to create and examine different scenarios, from which she may draw conclusions about the security of the protocols being studied. The Type III approach models the requirements of a protocol family using logics developed specifically for the analysis of knowledge and belief. Finally, the Type IV approach develops a formal model based on the algebraic term-rewriting properties of cryptographic systems. The majority of research and the most interesting results are in the Type III approach, including reasoning systems such as the BAN logic; we present these systems and compare their relative merits. While each approach has its benefits, no current method is able to provide a rigorous proof that a protocol is secure. | en_US |
dc.publisher | Center for Information Technology Integration | en_US |
dc.title | Formal Methods for the Analysis of Authentication Protocols | en_US |
dc.type | Technical Report | en_US |
dc.subject.hlbsecondlevel | Computer Science | en_US |
dc.subject.hlbtoplevel | Engineering | en_US |
dc.contributor.affiliationum | Center for Information Technology Integration | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/107949/1/citi-tr-93-7.pdf | |
dc.owningcollname | Electrical Engineering and Computer Science, Department of (EECS) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.