|Research Unit in Networking|
and G. Leduc1
1 Research unit in Networking, EECS department, University of Liège, Belgium
AbstractWe explain how the formal language LOTOS can be used to specify security protocols and cryptographic operations. We describe how to model security properties as safety properties and how a model-based verification method can be used to verify the robustness of a protocol against attacks of an intruder. We illustrate our technique on a concrete registration protocol. We find a simpler protocol that remains secure, and a more sophisticated protocol that allows a better distinction between intruder's attacks and ordinary errors.
Keywordsauthentication, formal verification, LOTOS specification, registration protocol, security, trusted third party
Editor: - G. Leduc -
Webmaster: - C. Soldani -
|Still running IPv4 at: 18.104.22.168...||